Windows 10 activation code free keygen,serial,crack

Windows 10 Pro 29.01.2017 crack serial keygen

windows 10 Pro 29.01.2017 crack serial keygen

Да и не забывайте, что если идёт перевес всего на 10 процентов, это не значит No registration registry easy serial crack space xonix v. Windows 10 pro 64 bit key 2019 serial numbers are presented here. No registration. The access to our data base is fast and free, enjoy. More to Read 1. January 29, 2017 | Author: Muhammed Parlak | Category: N/A. DOWNLOAD PDF - 835.9KB. Share Embed Donate. Report this link.

Was and: Windows 10 Pro 29.01.2017 crack serial keygen

DeepL Pro 1.13.0 Crack with License Key 2021 Free Download Latest Full
Windows 10 Pro 29.01.2017 crack serial keygen
Windows 10 Pro 29.01.2017 crack serial keygen
Office 2000 Multi Language Kit Disk 7 8 crack serial keygen

watch the video

Windows 10 Pro Activation Free All Versions Without Any Software Or Product Key Lifetime 2021 ✔

Windows 10 Pro 29.01.2017 crack serial keygen - opinion you

Author: Muhammed Parlak

More to Read 1

January 29, 2017

Proteus Pro 8.9 SP2 Portable is a superb software for designing electrical circuits. If you’re an electrical or electronics engineer, Proteus Portable software is certainly an excellent software for you.

Proteus Pro 8.9 Portable Description

Download Proteus Pro Portable is one of the simplest applications for advanced circuit design and you’ll drag and drop your circuits into the software before testing it and test your circuit with a simulator and if it’s faulty Side. Proteus software is predicated on the electrical component models in PSpice. With Proteus Pro 8 Portable, you’ll model microcontrollers, microprocessors, DSP and more.

Proteus Portable Download features a comprehensive library of electronic components that you simply can use in circuits. Important features of the Proteus program include real measurement devices like an oscilloscope, a generator signal, a voltmeter, an ammeter, etc.

Proteus Pro 8.9 Portable Free Download

The power to debug programs and execute them during a microcontroller, modeling various devices, economical Save time also as cost, PCB design location then on. So if you wish to check your circuits well before operating, determine their flaws.

Features For ARES Commander 2020 SP0 2020.0.1.1018.1535

  • Easy to use, yet high power and adaptability.
  • Design and simulation of AVR and a spread of high-precision and reliable electrical circuits.
  • Complete simulation design tools and a spread of measurement elements.
  • ISIS library with a variety of microcontrollers.
  • Ability to program in a software environment.
  • Quick design of PCB or PCB without changing the designed circuit.
  • VSM capability (stands for Virtual System Modeling and Virtual Modeling System).
  • Enjoy advanced routing modes.
  • Accurate and complete troubleshooting applications.
  • Graphics and 3D layout.

Proteus Pro 8.9 Portable Free Download

File Information

  • Name: Proteus_Professional_8.9_SP0_Build_27865_Portable.zip
  • File Size: 1.96 GB
  • After Extract: 2.11 GB
  • Publisher: Proteus
  • File Type: Rar File
  • Update Date: Feb 18, 2020
  • Languages: English

System Requirements For Proteus Pro 8.9 Portable

  • Operating System: Microsoft® Windows® 2000 with Service Pack 4, or Windows XP with Service Pack 1 or 2
  • Memory (RAM): 4 GB of RAM required for fast working.
  • Hard Disk Space: 4 GB of hard disk space for typical program installation.

Proteus Pro 8.9 Portable Free Download

Click the Below Download Button to start Proteus Pro Portable Free Download with Direct Download LinkPause and Resume. Proteus Pro 9 Portable For Windows Free Download is Placed on Our High speed dedicated server with the High-speed download of Download Proteus Pro Portable.

Download

Источник: [https://torrent-igruha.org/3551-portal.html]

Slow download speed, some sites are very slow

Hello, I am facing a problem with downloading and some sites. Tried to run MBAM but can't download updates, so I can't run scan. AVG has not found anything.

Downloading is very slow and some sites take about 5 minutes to load. I noticed these problems maybe a week ago, but thought it is some problem on my internet provider's side.

There are logs from FRST and RSIT.

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 14-11-2019 

Ran by SWAN (administrator) on PC (MSI MS-7721) (31-03-2020 13:39:49)

Running from C:\Users\SWAN\Desktop

Loaded Profiles: SWAN (Available Profiles: SWAN)

Platform: Windows 10 Pro Version 1809 17763.1098 (X64) Language: Čeština (Česko)

Default browser: Chrome

Boot Mode: Normal

Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

 

==================== Processes (Whitelisted) =================

 

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

 

() [File not signed] C:\Program Files (x86)\MSI\ControlCenter\Sleep\MSISleepService.exe

(Advanced Micro Devices, Inc. -> Advanced Micro Devices Inc.) C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\CCC.exe

(Advanced Micro Devices, Inc. -> Advanced Micro Devices Inc.) C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\MOM.exe

(Advanced Micro Devices, Inc.) [File not signed] C:\Program Files\AMD\ATI.ACE\Fuel\Fuel.Service.exe

(Apple Inc. -> Apple Inc.) C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

(AVG Netherlands B.V. -> AVG Technologies) C:\Program Files (x86)\AVG\Browser\Update\1.4.155.333\AVGBrowserCrashHandler.exe

(AVG Netherlands B.V. -> AVG Technologies) C:\Program Files (x86)\AVG\Browser\Update\1.4.155.333\AVGBrowserCrashHandler64.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\aswEngSrv.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\aswidsagent.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\AVGSvc.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\AVGUI.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\AVGUI.exe

(AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.) C:\Program Files\AVG\Antivirus\wsc_proxy.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleCrashHandler.exe

(Google LLC -> Google LLC) C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleCrashHandler64.exe

(LogMeIn, Inc. -> LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe

(LogMeIn, Inc. -> LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\x64\hamachi-2.exe

(LogMeIn, Inc. -> LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn Hamachi\x64\LMIGuardianSvc.exe

(Malwarebytes Inc -> Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe

(Malwarebytes Inc -> Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe

(Malwarebytes Inc -> Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe

(Microsoft Corporation -> Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe

(Microsoft Corporation -> Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe

(Microsoft Windows -> Microsoft Corporation) C:\Windows\System32\mqsvc.exe

(Microsoft Windows -> Microsoft Corporation) C:\Windows\System32\smartscreen.exe

(Microsoft Windows -> Microsoft Corporation) C:\Windows\System32\wlanext.exe

(Microsoft Windows -> Microsoft Corporation) C:\Windows\SysWOW64\wbem\WmiPrvSE.exe

(Microsoft Windows Hardware Compatibility Publisher -> AMD) C:\Windows\System32\atieclxx.exe

(Microsoft Windows Hardware Compatibility Publisher -> AMD) C:\Windows\System32\atiesrxx.exe

(MICRO-STAR INTERNATIONAL CO., LTD. -> MSI) C:\Program Files (x86)\MSI\Command Center\DDR\MSIDDRService.exe

(MICRO-STAR INTERNATIONAL CO., LTD. -> MSI) C:\Program Files (x86)\MSI\Command Center\MSIControlService.exe

(MICRO-STAR INTERNATIONAL CO., LTD. -> MSI) C:\Program Files (x86)\MSI\Super Charger\ChargeService.exe

(Realtek Semiconductor Corp. -> Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe

 

==================== Registry (Whitelisted) ===================

 

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

 

HKLM\...\Run: [RTHDVCPL] => C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe [9270560 2019-05-16] (Realtek Semiconductor Corp. -> Realtek Semiconductor)

HKLM\...\Run: [AVGUI.exe] => C:\Program Files\AVG\Antivirus\AvLaunch.exe [325704 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

HKLM-x32\...\Run: [LogMeIn Hamachi Ui] => C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe [5890504 2019-04-02] (LogMeIn, Inc. -> LogMeIn Inc.)

HKLM-x32\...\Run: [ControlCenterCount] => C:\Program Files (x86)\MSI\ControlCenter\ControlCenterCount.exe [872448 2012-03-26] (MSI CO.,LTD.) [File not signed]

HKLM-x32\...\Run: [Command Center] => C:\Program Files (x86)\MSI\Command Center\StartCommandCenter.exe [835680 2016-06-14] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

HKLM-x32\...\Run: [Super Charger] => C:\Program Files (x86)\MSI\Super Charger\Super Charger.exe [1028280 2017-11-10] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\amd64\CLIStart.exe [767176 2015-08-04] (Advanced Micro Devices, Inc. -> Advanced Micro Devices, Inc.)

HKLM\SOFTWARE\Policies\Microsoft\Windows Defender: Restriction <==== ATTENTION

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [Gaijin.Net Agent] => C:\Users\SWAN\AppData\Local\Gaijin\Program Files (x86)\NetAgent\gjagent.exe [2125384 2018-09-25] (Gaijin Network LTD -> Gaijin Entertainment)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [EPLTarget\P0000000000000000] => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_IATILQE.EXE [297024 2013-01-24] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [EPLTarget\P0000000000000001] => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_IATILQE.EXE [297024 2013-01-24] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [Spotify] => C:\Users\SWAN\AppData\Roaming\Spotify\Spotify.exe [22825376 2020-03-15] (Spotify AB -> Spotify Ltd)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [Steam] => C:\Program Files (x86)\Steam\steam.exe [3365840 2020-02-11] (Valve -> Valve Corporation)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [Reference 4 Systemwide] => C:\Program Files\Sonarworks\Reference 4\Systemwide\Reference 4 Systemwide.exe [14890480 2019-06-07] (Sonarworks, SIA -> Sonarworks) [File not signed]

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Run: [AppEx Accelerator UI] => C:\Program Files\AMD Quick Stream\AMDQuickStream.exe [488640 2015-04-06] (AppEx Networks Corporation -> AppEx Networks Corporation)

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Policies\Explorer: [NolowDiskSpaceChecks] 1

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Policies\Explorer: [LinkResolveIgnoreLinkInfo] 1

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Policies\Explorer: [NoResolveSearch] 1

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\...\Policies\Explorer: [NoInternetOpenWith] 1

HKU\S-1-5-21-2071813083-1845976314-806757171-1000\Sortware\Policies\...\system: [disablecmd] 0

HKU\S-1-5-18\...\RunOnce: [Application Restart #0] => C:\Windows\SysWOW64\muachost.exe [1692840 2015-08-18] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

HKLM\Software\Microsoft\Active Setup\Installed Components: [{8A69D345-D564-463c-AFF1-A69D9E530F96}] -> C:\Program Files (x86)\Google\Chrome\Application\80.0.3987.149\Installer\chrmstp.exe [2020-03-19] (Google LLC -> Google LLC)

HKLM\Software\Wow6432Node\Microsoft\Active Setup\Installed Components: [{48F69C39-1356-4A7B-A899-70E3539D4982}] -> C:\Program Files (x86)\AVG\Browser\Application\80.0.3623.134\Installer\chrmstp.exe [2020-03-19] (AVG Technologies USA, LLC -> AVG Technologies)

HKLM\Software\Wow6432Node\Microsoft\Active Setup\Installed Components: [{8A69D345-D564-463c-AFF1-A69D9E530F96}] -> "C:\Program Files (x86)\Google\Chrome\Application\75.0.3770.142\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level

HKLM\Software\...\Authentication\Credential Providers: [{503739d0-4c5e-4cfd-b3ba-d881334f0df2}] -> 

Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\update.bat [2019-04-15] () [File not signed]

FF HKLM\SOFTWARE\Policies\Mozilla\Firefox: Restriction <==== ATTENTION

CHR HKLM\SOFTWARE\Policies\Google: Restriction <==== ATTENTION

CHR HKU\.DEFAULT\SOFTWARE\Policies\Google: Restriction <==== ATTENTION

CHR HKU\S-1-5-21-2071813083-1845976314-806757171-1000\SOFTWARE\Policies\Google: Restriction <==== ATTENTION

 

==================== Scheduled Tasks (Whitelisted) ============

 

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

 

Task: {00DC2D35-E5CC-46BE-BCCE-3D5FF6D6DD4C} - System32\Tasks\Microsoft\Windows\Media Center\RecordingRestart => C:\WINDOWS\ehome\ehrec.exe

Task: {01235679-AA05-40EE-BDAA-0CE062C3DE01} - System32\Tasks\Antivirus Emergency Update => C:\Program Files\AVG\Antivirus\AvEmUpdate.exe [3942704 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

Task: {03DF4745-4E63-4BCE-BE64-313E94274BB4} - System32\Tasks\Microsoft\Windows\Media Center\UpdateRecordPath => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {03E427EE-F537-49B6-95BA-AE27E74A057C} - System32\Tasks\Microsoft\Windows\SideShow\AutoWake => {E51DFD48-AA36-4B45-BB52-E831F02E8316}

Task: {06E0408D-865F-4968-931B-994B8A870FD5} - System32\Tasks\Microsoft\Windows\Media Center\OCURDiscovery => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {0C85FD5E-8479-4CE1-9918-A658746D084D} - System32\Tasks\Microsoft\Windows\Media Center\RegisterSearch => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {274E6A60-04E7-45F1-9AF5-8720A3227BE2} - System32\Tasks\CCleanerSkipUAC => C:\Program Files\CCleaner\CCleaner.exe [14679256 2019-02-05] (Piriform Software Ltd -> Piriform Software Ltd)

Task: {3610F1EF-E32C-483F-85CA-1D27648C002F} - System32\Tasks\{996C2E56-CF8D-42B1-8BB4-5B25693FCF2F} => C:\Windows\system32\pcalua.exe -a "C:\Program Files (x86)\unIosales\3xzfRV2iP452n4.exe" -c /s /n /i:"ExecuteCommands;UninstallCommands" ""

Task: {36663483-C447-491B-AAB5-9CDD36E148E9} - System32\Tasks\AVG Secure Browser Heartbeat Task (Hourly) => C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe [1871496 2020-03-09] (AVG Technologies USA, LLC -> AVG Technologies)

Task: {38A7E5EB-5BDB-44A5-A0CB-8611C403C98B} - System32\Tasks\Microsoft\Windows\MobilePC\HotStart => {06DA0625-9701-43da-BFD7-FBEEA2180A1E}

Task: {455FAF33-2070-4804-969D-5174EB082EAD} - System32\Tasks\Microsoft\Windows\Media Center\PvrRecoveryTask => C:\WINDOWS\ehome\mcupdate.exe

Task: {486D715E-6AA2-44CF-BC48-B6990CBB53C6} - System32\Tasks\Microsoft\Windows\Shell\WindowsParentalControlsMigration => {343D770D-7788-47c2-B62A-B7C4CED925CB}

Task: {4FB12AAE-257E-4B64-8BA6-8AA0222CDF81} - System32\Tasks\Microsoft\Windows\SideShow\GadgetManager => {FF87090D-4A9A-4f47-879B-29A80C355D61}

Task: {528933E0-C10D-4157-8589-EE21C8C994A9} - System32\Tasks\Microsoft\Windows\SideShow\SessionAgent => {45F26E9E-6199-477F-85DA-AF1EDfE067B1}

Task: {5504F1AB-5B21-4F39-938A-784E9A93FB81} - System32\Tasks\Microsoft\Windows\Media Center\PBDADiscoveryW1 => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {578A7634-3F17-4AFA-B002-953AC917BA64} - System32\Tasks\AVG Secure Browser Heartbeat Task (Logon) => C:\Program Files (x86)\AVG\Browser\Application\AVGBrowser.exe [1871496 2020-03-09] (AVG Technologies USA, LLC -> AVG Technologies)

Task: {589DAEB1-19D3-4B07-A658-460B9CFF60D7} - System32\Tasks\Microsoft\Windows\Media Center\ReindexSearchRoot => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {5B42DD9C-5A26-4F27-BB95-34603F0997E5} - System32\Tasks\Microsoft\Windows\Shell\WindowsParentalControls => {DFA14C43-F385-4170-99CC-1B7765FA0E4A}

Task: {61E8D464-6C98-4658-B87B-448552DE725E} - System32\Tasks\AVG\Overseer => C:\Program Files\Common Files\AVG\Overseer\overseer.exe [1692296 2020-02-27] (AVG Technologies USA, LLC -> AVG Technologies)

Task: {64F0B012-C0A9-4289-BDE1-FC6FB75EC1BB} - System32\Tasks\{466120E4-8C8C-4E51-8B69-F46BFC8B4EEF} => C:\Windows\system32\pcalua.exe -a E:\Autorun.exe -d E:\

Task: {6959ABD3-1070-4FD9-8744-3DF8A135BFD0} - System32\Tasks\Microsoft\Windows\Media Center\ConfigureInternetTimeService => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {69A88827-1A8C-4D96-A3C2-793E4AC49E3C} - System32\Tasks\Adobe Flash Player PPAPI Notifier => C:\WINDOWS\SysWOW64\Macromed\Flash\FlashUtil32_32_0_0_270_pepper.exe [1453112 2019-10-09] (Adobe Inc. -> Adobe)

Task: {6B46E3AA-A48A-4458-AC9D-6B57044B8A63} - System32\Tasks\Microsoft\Office\Office 15 Subscription Heartbeat => C:\Program Files\Common Files\Microsoft Shared\Office16\OLicenseHeartbeat.exe [316632 2015-07-31] (Microsoft Corporation -> Microsoft Corporation)

Task: {7082DA51-DA86-4FD1-A98B-07CA0B6DE8CD} - System32\Tasks\Safer-Networking\Spybot Anti-Beacon\Refresh Anti-Beacon immunization => C:\Program Files (x86)\Safer-Networking Ltd\Spybot Anti-Beacon\Spybot3AntiBeacon.exe [8969432 2019-08-29] (Safer-Networking Ltd. -> )

Task: {71C551CB-1657-4835-A13C-87E4D16F0EA9} - System32\Tasks\Microsoft\Windows\Media Center\ActivateWindowsSearch => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {76EF653B-6228-4BB0-AA24-D6509BEE3D4D} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [335416 2019-10-09] (Adobe Inc. -> Adobe)

Task: {7782C681-6BDF-43A8-B682-EBD5E7870393} - System32\Tasks\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask => C:\WINDOWS\ehome\mcupdate.exe

Task: {89336325-52D8-40E6-901A-5DDE8395BC42} - System32\Tasks\Microsoft\Windows\Media Center\PvrScheduleTask => C:\WINDOWS\ehome\mcupdate.exe

Task: {8AD212BB-6785-46E3-A683-8C6DA2D9E641} - System32\Tasks\Microsoft\Windows\Media Center\PBDADiscovery => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {8C5E4BFF-60F7-452D-8991-04DAF349CB0A} - System32\Tasks\Microsoft\Windows\Media Center\ehDRMInit => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {8CAC1675-DDDF-49A2-A52F-FEF4B92CDC33} - System32\Tasks\AVGUpdateTaskMachineCore => C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe [165520 2018-11-02] (AVG Netherlands B.V. -> AVG Technologies)

Task: {8D4736F8-A8B2-431D-8009-AFAFB642F929} - System32\Tasks\EPSON XP-610 Series Update {F046D536-3200-4F23-BAD7-73FA9472B4DD} => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE [679488 2013-02-28] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

Task: {8EA7FB19-561A-43A7-AD47-8CFDA5D00CEF} - System32\Tasks\{C3E3F5FC-6C4D-4BEB-AFB6-6E0AF263B50A} => C:\Windows\system32\pcalua.exe -a "C:\Program Files (x86)\HD-V1.9\Uninstall.exe" -c /fcp=1

Task: {8F71AC29-E88F-403F-9659-0A8B5ABF81A4} - System32\Tasks\Microsoft\Windows\Media Center\PeriodicScanRetry => C:\WINDOWS\ehome\MCUpdate.exe

Task: {95606B13-9A48-4726-B5ED-AE5A404C402D} - System32\Tasks\CreateExplorerShellUnelevatedTask => C:\WINDOWS\explorer.exe /NOUACCHECK

Task: {975CA11C-29B2-479B-8CCA-10CBACDCE9BD} - System32\Tasks\Microsoft\Windows\Media Center\MediaCenterRecoveryTask => C:\WINDOWS\ehome\mcupdate.exe

Task: {9FCB9B0A-1605-4542-AB35-1D9C8074E1F6} - System32\Tasks\EPSON XP-610 Series Invitation {F046D536-3200-4F23-BAD7-73FA9472B4DD} => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE [679488 2013-02-28] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

Task: {A288DD09-6487-43C8-BB4D-12C0F2584A73} - System32\Tasks\Microsoft\Windows\Media Center\SqlLiteRecoveryTask => C:\WINDOWS\ehome\mcupdate.exe

Task: {A2FE3E52-3986-48F0-9AE0-EA2AA5A1CF14} - System32\Tasks\Microsoft\Windows\SideShow\SystemDataProviders => {7CCA6768-8373-4D28-8876-83E8B4E3A969}

Task: {A6132231-63DC-4B7E-989A-7F5FFDDB3AE4} - System32\Tasks\{1CA0FA9F-C6F9-42E3-8D18-DFCEB9BCE8C7} => C:\Windows\system32\pcalua.exe -a "C:\Program Files (x86)\Torntv V9.0\Uninstall.exe" -c /fromcontrolpanel=1

Task: {A6858A86-6B1F-4564-94E7-7B28F377E4B0} - System32\Tasks\Microsoft\Windows\Media Center\InstallPlayReady => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {ACBD6E4C-ECC0-4FEE-BED4-9EE0E46E287F} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [144200 2015-08-09] (Google Inc -> Google Inc.)

Task: {AFCFAD6C-C942-4724-8EEE-A8638EA78C1F} - System32\Tasks\EPSON XP-610 Series Invitation {2CEC53D3-1048-4830-A3EB-6CDB033BFCB0} => C:\Windows\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE [679488 2013-02-28] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

Task: {B07CDC2B-CD1A-46E7-98A7-96D8AC0D5469} - System32\Tasks\{B99D28A7-9F65-43D0-9F08-97012174B353} => C:\Windows\system32\pcalua.exe -a "C:\Program Files (x86)\We Love Deals\We Love Deals.exe" -c /s /n /i:"ExecuteCommands;UninstallCommands" ""

Task: {B0CBAB43-44FC-469B-A4CE-87426761FDCE} - System32\Tasks\Microsoft\Windows\PerfTrack\BackgroundConfigSurveyor => {EA9155A3-8A39-40b4-8963-D3C761B18371}

Task: {BA9D6900-DDC0-47F4-BA43-57CB108A29A9} - System32\Tasks\Microsoft\Windows\Media Center\DispatchRecoveryTasks => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {C7F296B9-254A-471B-B3E2-5CE93FF9A754} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [616320 2018-01-08] (Apple Inc. -> Apple Inc.)

Task: {CBA8CAC1-7E10-4759-A25D-7CF5A389610C} - System32\Tasks\Microsoft\Windows\Media Center\PBDADiscoveryW2 => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {D1C2F64E-B395-42D3-B663-34C629E83752} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [144200 2015-08-09] (Google Inc -> Google Inc.)

Task: {DC98F61B-53A1-4E32-B562-0C6A91966862} - System32\Tasks\AVGUpdateTaskMachineUA => C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe [165520 2018-11-02] (AVG Netherlands B.V. -> AVG Technologies)

Task: {E2DA047C-5A60-42E2-A778-8BFDC85C77DA} - System32\Tasks\EPSON XP-610 Series Update {2CEC53D3-1048-4830-A3EB-6CDB033BFCB0} => C:\Windows\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE [679488 2013-02-28] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

Task: {E829E330-F4B6-43DF-A74E-467D35E90B5C} - System32\Tasks\CCleaner Update => C:\Program Files\CCleaner\CCUpdate.exe [619416 2019-02-05] (Piriform Software Ltd -> Piriform Software Ltd)

Task: {ECC8BAA6-5412-488B-8FCD-61FCCCD18D5F} - System32\Tasks\Microsoft\Windows\Media Center\OCURActivate => C:\WINDOWS\ehome\ehPrivJob.exe

Task: {FD96C816-E8A7-47C4-B713-1621870F44DB} - System32\Tasks\Microsoft\Windows\Media Center\mcupdate => C:\WINDOWS\ehome\mcupdate.exe

 

(If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.)

 

Task: C:\WINDOWS\Tasks\EPSON XP-610 Series Invitation {2CEC53D3-1048-4830-A3EB-6CDB033BFCB0}.job => C:\Windows\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE

Task: C:\WINDOWS\Tasks\EPSON XP-610 Series Invitation {F046D536-3200-4F23-BAD7-73FA9472B4DD}.job => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE

Task: C:\WINDOWS\Tasks\EPSON XP-610 Series Update {2CEC53D3-1048-4830-A3EB-6CDB033BFCB0}.job => C:\Windows\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE:/EXE:{2CEC53D3-1048-4830-A3EB-6CDB033BFCB0} /F:UpdateSYSTEMĊSearches for EPSON software updates, and notifies you when updates are available.If this task is disabled or stopped, your EPSON software will not be automatically kept up to date.Thi

Task: C:\WINDOWS\Tasks\EPSON XP-610 Series Update {F046D536-3200-4F23-BAD7-73FA9472B4DD}.job => C:\WINDOWS\system32\spool\DRIVERS\x64\3\E_ITSLQE.EXE:/EXE:{F046D536-3200-4F23-BAD7-73FA9472B4DD} /F:UpdateWORKGROUP\SWAN-PC$ĊSearches for EPSON software updates, and notifies you when updates are available.If this task is disabled or stopped, your EPSON software will not be automatically kept up to date.Thi

 

==================== Internet (Whitelisted) ====================

 

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

 

Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt

Tcpip\..\Interfaces\{0DA8CC2C-FE9D-44AE-B37E-E6316F216CD9}: [DhcpNameServer] 192.168.0.1

Tcpip\..\Interfaces\{212ccb34-bd9a-47e4-8b8c-d9b116be0a04}: [DhcpNameServer] 192.168.0.1

Tcpip\..\Interfaces\{4BDB8EF9-88CC-4624-83B4-ED7CB716502E}: [DhcpNameServer] 8.8.8.8 194.12.32.193 176.62.225.2

Tcpip\..\Interfaces\{62e421a9-fed2-4db4-b2ff-18aedefafa90}: [DhcpNameServer] 192.168.0.1

 

Internet Explorer:

==================

HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.com

SearchScopes: HKU\S-1-5-21-2071813083-1845976314-806757171-1000 -> {012E1000-F331-11DB-8314-0800200C9A66} URL = hxxp://www.google.com/search?q={searchTerms}

BHO: SteadyVideoBHO Class -> {6C680BAE-655C-4E3D-8FC4-E6A520C3D928} -> C:\Program Files\AMD\SteadyVideo\SteadyVideo.dll [2012-02-14] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

BHO: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre1.8.0_121\bin\ssv.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

BHO: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre1.8.0_121\bin\jp2ssv.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

BHO-x32: SteadyVideoBHO Class -> {6C680BAE-655C-4E3D-8FC4-E6A520C3D928} -> C:\Program Files (x86)\amd\SteadyVideo\SteadyVideo.dll [2012-02-14] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre1.8.0_121\bin\ssv.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

BHO-x32: Microsoft OneDrive for Business Browser Helper -> {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} -> C:\Program Files (x86)\Microsoft Office\Office16\GROOVEEX.DLL [2016-06-15] (Microsoft Corporation -> Microsoft Corporation)

BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre1.8.0_121\bin\jp2ssv.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

Handler: mso-minsb.16 - {3459B272-CC19-4448-86C9-DDC3B4B2FAD3} - C:\Program Files\Microsoft Office\Office16\MSOSB.DLL [2016-06-14] (Microsoft Corporation -> Microsoft Corporation)

Handler-x32: mso-minsb.16 - {3459B272-CC19-4448-86C9-DDC3B4B2FAD3} - C:\Program Files (x86)\Microsoft Office\Office16\MSOSB.DLL [2016-06-14] (Microsoft Corporation -> Microsoft Corporation)

Handler: osf.16 - {5504BE45-A83B-4808-900A-3A5C36E7F77A} - C:\Program Files\Microsoft Office\Office16\MSOSB.DLL [2016-06-14] (Microsoft Corporation -> Microsoft Corporation)

Handler-x32: osf.16 - {5504BE45-A83B-4808-900A-3A5C36E7F77A} - C:\Program Files (x86)\Microsoft Office\Office16\MSOSB.DLL [2016-06-14] (Microsoft Corporation -> Microsoft Corporation)

Filter: video/mp4 - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files\AMD\SteadyVideo\VideoMIMEFilter.dll [2011-06-08] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

Filter-x32: video/mp4 - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll [2011-06-08] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

Filter: video/x-flv - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files\AMD\SteadyVideo\VideoMIMEFilter.dll [2011-06-08] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

Filter-x32: video/x-flv - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll [2011-06-08] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

 

FireFox:

========

FF ProfilePath: C:\Users\SWAN\AppData\Roaming\Nvu\Profiles\pefchsj5.default [2018-06-28]

FF Homepage: Nvu\Profiles\pefchsj5.default -> about:home

FF NewTab: Nvu\Profiles\pefchsj5.default -> about:newtab

FF Plugin: @java.com/DTPlugin,version=11.121.2 -> C:\Program Files\Java\jre1.8.0_121\bin\dtplugin\npDeployJava1.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

FF Plugin: @java.com/JavaPlugin,version=11.121.2 -> C:\Program Files\Java\jre1.8.0_121\bin\plugin2\npjp2.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

FF Plugin: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~1\MICROS~2\Office16\NPSPWRAP.DLL [2015-07-31] (Microsoft Corporation -> Microsoft Corporation)

FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/pdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2016-12-08] (Foxit Software Incorporated -> Foxit Corporation)

FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.fdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2016-12-08] (Foxit Software Incorporated -> Foxit Corporation)

FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.xdp -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2016-12-08] (Foxit Software Incorporated -> Foxit Corporation)

FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.xfdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2016-12-08] (Foxit Software Incorporated -> Foxit Corporation)

FF Plugin-x32: @java.com/DTPlugin,version=11.121.2 -> C:\Program Files (x86)\Java\jre1.8.0_121\bin\dtplugin\npDeployJava1.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

FF Plugin-x32: @java.com/JavaPlugin,version=11.121.2 -> C:\Program Files (x86)\Java\jre1.8.0_121\bin\plugin2\npjp2.dll [2017-01-29] (Oracle America, Inc. -> Oracle Corporation)

FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~2\MICROS~1\Office16\NPSPWRAP.DLL [2015-07-31] (Microsoft Corporation -> Microsoft Corporation)

 

Chrome: 

=======

CHR StartupUrls: Default -> "hxxps://www.facebook.com/"

CHR Profile: C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default [2020-03-31]

CHR Extension: (Prezentace) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2018-06-28]

CHR Extension: (Dokumenty) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2018-06-28]

CHR Extension: (Disk Google) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2018-06-28]

CHR Extension: (YouTube) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2018-06-28]

CHR Extension: (Tabulky) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2018-06-28]

CHR Extension: (Dokumenty Google offline) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi [2020-03-11]

CHR Extension: (AdBlock — best ad blocker) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\gighmmpiobklfepjocnamgkkbiglidom [2020-03-17]

CHR Extension: (Platby Internetového obchodu Chrome) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2019-10-04]

CHR Extension: (Gmail) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2019-04-29]

CHR Extension: (Chrome Media Router) - C:\Users\SWAN\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2020-03-20]

CHR HKLM-x32\...\Chrome\Extension: [mbckjcfnjmoiinpgddefodcighgikkgn]

 

==================== Services (Whitelisted) ===================

 

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

 

R2 AMD External Events Utility; C:\WINDOWS\system32\atiesrxx.exe [255512 2015-08-09] (Microsoft Windows Hardware Compatibility Publisher -> AMD)

R2 AMD FUEL Service; C:\Program Files\AMD\ATI.ACE\Fuel\Fuel.Service.exe [344064 2015-08-04] (Advanced Micro Devices, Inc.) [File not signed]

R2 Apple Mobile Device Service; C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe [85304 2018-10-16] (Apple Inc. -> Apple Inc.)

S2 avg; C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe [165520 2018-11-02] (AVG Netherlands B.V. -> AVG Technologies)

R2 AVG Antivirus; C:\Program Files\AVG\Antivirus\AVGSvc.exe [413544 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R3 avgbIDSAgent; C:\Program Files\AVG\Antivirus\aswidsagent.exe [6094272 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

S3 avgm; C:\Program Files (x86)\AVG\Browser\Update\AVGBrowserUpdate.exe [165520 2018-11-02] (AVG Netherlands B.V. -> AVG Technologies)

S3 AVGSecureBrowserElevationService; C:\Program Files (x86)\AVG\Browser\Application\80.0.3623.134\elevation_service.exe [973792 2020-03-09] (AVG Technologies USA, LLC -> AVG Technologies)

R2 AvgWscReporter; C:\Program Files\AVG\Antivirus\wsc_proxy.exe [110608 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

S3 BEService; C:\Program Files (x86)\Common Files\BattlEye\BEService.exe [8402648 2019-11-30] (BattlEye Innovations e.K. -> )

S3 Disc Soft Lite Bus Service; C:\Program Files\DAEMON Tools Lite\DiscSoftBusService.exe [1272592 2015-02-27] (Disc Soft Ltd -> Disc Soft Ltd)

S3 EasyAntiCheat; C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe [777856 2019-11-30] (EasyAntiCheat Oy -> EasyAntiCheat Ltd)

S4 EPSON_PM_RPCV4_06; C:\Program Files\Common Files\EPSON\EPW!3 SSRP\E_S60RPB.EXE [152640 2013-04-15] (SEIKO EPSON Corporation -> SEIKO EPSON CORPORATION)

S4 FLEXnet Licensing Service; C:\Program Files (x86)\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe [654848 2014-08-31] (Macrovision Europe Ltd.) [File not signed]

S4 FoxitReaderService; C:\Program Files (x86)\Foxit Software\Foxit Reader\FoxitConnectedPDFService.exe [1659592 2016-11-15] (Foxit Software Incorporated -> Foxit Software Inc.)

R2 Hamachi2Svc; C:\Program Files (x86)\LogMeIn Hamachi\x64\hamachi-2.exe [3361736 2019-04-02] (LogMeIn, Inc. -> LogMeIn Inc.)

S4 IDriverT; C:\Program Files (x86)\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe [69632 2005-04-04] (Macrovision Corporation) [File not signed]

R2 LMIGuardianSvc; C:\Program Files (x86)\LogMeIn Hamachi\x64\LMIGuardianSvc.exe [419248 2016-05-27] (LogMeIn, Inc. -> LogMeIn, Inc.)

R4 MBAMInstallerService; C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe [6009264 2020-03-31] (Malwarebytes Inc -> Malwarebytes)

R2 MBAMService; C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe [6960640 2020-02-18] (Malwarebytes Inc -> Malwarebytes)

S3 MSIClock_CC; C:\Program Files (x86)\MSI\Command Center\ClockGen\MSIClockService.exe [4163680 2016-09-09] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

S3 MSICOMM_CC; C:\Program Files (x86)\MSI\Command Center\MSICommService.exe [2206304 2017-01-06] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

S3 MSICPU_CC; C:\Program Files (x86)\MSI\Command Center\CPU\MSICPUService.exe [4172896 2017-02-24] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 MSICTL_CC; C:\Program Files (x86)\MSI\Command Center\MSIControlService.exe [2102880 2017-02-15] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 MSIDDR_CC; C:\Program Files (x86)\MSI\Command Center\DDR\MSIDDRService.exe [2330296 2017-09-07] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 MSISleep; C:\Program Files (x86)\MSI\ControlCenter\Sleep\MSISleepService.exe [282624 2013-04-29] () [File not signed]

S3 MSISMB_CC; C:\Program Files (x86)\MSI\Command Center\SMBus\MSISMBService.exe [2076768 2016-12-05] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

S3 MSISuperIO_CC; C:\Program Files (x86)\MSI\Command Center\SuperIO\MSISuperIOService.exe [611936 2017-02-10] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 MSI_SuperCharger; C:\Program Files (x86)\MSI\Super Charger\ChargeService.exe [183480 2019-02-14] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

S3 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [66872 2014-03-19] (Even Balance, Inc. -> )

S3 PnkBstrB; C:\Windows\SysWOW64\PnkBstrB.exe [103736 2014-03-19] (Even Balance, Inc. -> )

S3 Sense; C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe [5897968 2020-03-17] (Microsoft Windows Publisher -> Microsoft Corporation)

S3 uncheater_bgl; C:\Program Files\Common Files\Uncheater\uncheater_bgl.exe [2097008 2019-11-30] (Wellbia.com Co., Ltd. -> Wellbia.com Co., Ltd.)

S3 WdNisSvc; C:\Program Files\Windows Defender\NisSrv.exe [3831576 2019-06-13] (Microsoft Corporation -> Microsoft Corporation)

S3 WinDefend; C:\Program Files\Windows Defender\MsMpEng.exe [110944 2018-09-15] (Microsoft Corporation -> Microsoft Corporation)

 

===================== Drivers (Whitelisted) ===================

 

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

 

S0 amdkmafd; C:\WINDOWS\System32\drivers\amdkmafd.sys [31992 2015-06-03] (Advanced Micro Devices, Inc. -> Advanced Micro Devices, Inc.)

R3 amdkmdag; C:\WINDOWS\system32\DRIVERS\atikmdag.sys [21631512 2015-08-09] (Microsoft Windows Hardware Compatibility Publisher -> Advanced Micro Devices, Inc.)

R3 amdkmdap; C:\WINDOWS\system32\DRIVERS\atikmpag.sys [673816 2015-08-09] (Microsoft Windows Hardware Compatibility Publisher -> Advanced Micro Devices, Inc.)

R0 amd_sata; C:\WINDOWS\System32\drivers\amd_sata.sys [85704 2017-01-29] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

R0 amd_xata; C:\WINDOWS\System32\drivers\amd_xata.sys [43720 2017-01-29] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

R2 AODDriver4.3; C:\Program Files\AMD\ATI.ACE\Fuel\amd64\AODDriver2.sys [59616 2014-02-11] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

R2 APXACC; C:\WINDOWS\system32\DRIVERS\appexDrv.sys [229056 2015-04-03] (AppEx Networks Corporation -> AppEx Networks Corporation)

R3 AtiHDAudioService; C:\WINDOWS\system32\drivers\AtihdWT6.sys [102912 2015-07-22] (Microsoft Windows Hardware Compatibility Publisher -> Advanced Micro Devices)

R0 avgArDisk; C:\WINDOWS\System32\drivers\avgArDisk.sys [37928 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R1 avgArPot; C:\WINDOWS\System32\drivers\avgArPot.sys [206160 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R1 avgbidsdriver; C:\WINDOWS\System32\drivers\avgbidsdriver.sys [271704 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R0 avgbidsh; C:\WINDOWS\System32\drivers\avgbidsh.sys [207192 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R0 avgbuniv; C:\WINDOWS\System32\drivers\avgbuniv.sys [64344 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R0 avgElam; C:\WINDOWS\System32\drivers\avgElam.sys [16520 2020-02-25] (Microsoft Windows Early Launch Anti-malware Publisher -> AVG Technologies CZ, s.r.o.)

R1 avgKbd; C:\WINDOWS\System32\drivers\avgKbd.sys [43560 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R2 avgMonFlt; C:\WINDOWS\System32\drivers\avgMonFlt.sys [175472 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R1 avgRdr; C:\WINDOWS\System32\drivers\avgRdr2.sys [111144 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R0 avgRvrt; C:\WINDOWS\System32\drivers\avgRvrt.sys [84096 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R1 avgSnx; C:\WINDOWS\System32\drivers\avgSnx.sys [849256 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R1 avgSP; C:\WINDOWS\System32\drivers\avgSP.sys [459192 2020-03-11] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R2 avgStm; C:\WINDOWS\System32\drivers\avgStm.sys [235280 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R0 avgVmm; C:\WINDOWS\System32\drivers\avgVmm.sys [316840 2020-02-25] (AVG Technologies USA, LLC -> AVG Technologies CZ, s.r.o.)

R3 dtlitescsibus; C:\WINDOWS\System32\drivers\dtlitescsibus.sys [30352 2015-04-03] (Disc Soft Ltd -> Disc Soft Ltd)

R3 Hamachi; C:\WINDOWS\system32\DRIVERS\Hamdrv.sys [45680 2019-02-11] (Microsoft Windows Hardware Compatibility Publisher -> LogMeIn Inc.)

R1 HWiNFO32; C:\Windows\SysWOW64\drivers\HWiNFO64A.SYS [26528 2015-01-05] (Martin Malik - REALiX -> REALiX™)

S3 ipadtst; C:\Program Files (x86)\MSI\Super Charger\ipadtst_64.sys [20464 2013-11-11] (MICRO-STAR INTERNATIONAL CO., LTD. -> Windows ® Win 7 DDK provider)

S3 ipadtst2; C:\Program Files (x86)\MSI\Super Charger\ipadtst2_64.sys [16336 2016-07-29] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 MBAMChameleon; C:\WINDOWS\System32\Drivers\MbamChameleon.sys [214496 2020-03-31] (Malwarebytes Inc -> Malwarebytes)

S0 MbamElam; C:\WINDOWS\System32\DRIVERS\MbamElam.sys [20936 2020-02-18] (Microsoft Windows Early Launch Anti-malware Publisher -> Malwarebytes)

R3 MBAMSwissArmy; C:\WINDOWS\System32\Drivers\mbamswissarmy.sys [248968 2020-03-31] (Malwarebytes Inc -> Malwarebytes)

S3 Netaapl; C:\WINDOWS\System32\drivers\netaapl64.sys [23040 2016-12-21] (Microsoft Windows Hardware Compatibility Publisher -> Apple Inc.)

S3 NTIOLib_1_0_2; C:\Program Files (x86)\MSI\ControlCenter\NTIOLib_X64.sys [13328 2012-02-14] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

S3 NTIOLib_1_0_3; C:\Program Files (x86)\MSI\Super-Charger\NTIOLib_X64.sys [13368 2012-10-25] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R3 NTIOLib_MSIDDR_CC; C:\Program Files (x86)\MSI\Command Center\DDR\NTIOLib_X64.sys [13368 2012-11-26] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R3 NTIOLib_MSISMB_CC; C:\Program Files (x86)\MSI\ControlCenter\Sleep\NTIOLib_X64.sys [13368 2012-11-09] (MICRO-STAR INTERNATIONAL CO., LTD. -> MSI)

R2 RAMDriv; C:\WINDOWS\system32\DRIVERS\ramdriv.sys [86936 2016-03-10] (Christiaan GHIJSELINCK -> Micro-Star Int'l Co., Ltd.)

R2 RAMDriv; C:\Windows\SysWOW64\DRIVERS\ramdriv.sys [86936 2016-03-10] (Christiaan GHIJSELINCK -> Micro-Star Int'l Co., Ltd.)

R3 rt640x64; C:\WINDOWS\System32\drivers\rt640x64.sys [1138136 2019-02-20] (Realtek Semiconductor Corp. -> Realtek )

R3 RtlWlanu; C:\WINDOWS\System32\drivers\rtwlanu.sys [8206848 2018-09-15] (Microsoft Windows -> Realtek Semiconductor Corporation )

R2 rzpnk; C:\Windows\system32\drivers\rzpnk.sys [129856 2014-04-25] (Razer Inc. -> Razer, Inc.)

R3 sonarworks_VirtualDevice; C:\WINDOWS\system32\DRIVERS\sonarworks.sys [444200 2019-10-25] (SIA Sonarworks -> Sonarworks)

R2 speedfan; C:\WINDOWS\SysWOW64\speedfan.sys [28664 2012-12-29] (SOKNO S.R.L. -> Almico Software)

S3 USBAAPL64; C:\WINDOWS\System32\Drivers\usbaapl64.sys [54784 2016-12-21] (Microsoft Windows Hardware Compatibility Publisher -> Apple, Inc.)

R3 usbfilter; C:\WINDOWS\System32\DRIVERS\usbfilter.sys [58536 2012-08-28] (Advanced Micro Devices, Inc. -> Advanced Micro Devices)

S3 WdBoot; C:\WINDOWS\system32\drivers\WdBoot.sys [46584 2018-09-15] (Microsoft Windows Early Launch Anti-malware Publisher -> Microsoft Corporation)

S3 WdFilter; C:\WINDOWS\system32\drivers\WdFilter.sys [340008 2018-09-15] (Microsoft Windows -> Microsoft Corporation)

S3 WdNisDrv; C:\WINDOWS\System32\Drivers\WdNisDrv.sys [61992 2018-09-15] (Microsoft Windows -> Microsoft Corporation)

S3 xhunter1; C:\WINDOWS\xhunter1.sys [74552 2020-02-12] (Wellbia.com Co., Ltd. -> Wellbia.com Co., Ltd.)

S3 cpuz136; \??\C:\WINDOWS\TEMP\cpuz136\cpuz136_x64.sys [X]

S3 GPUZ; \??\C:\WINDOWS\TEMP\GPUZ.sys [X]

U3 idsvc; no ImagePath

S3 VGAOCTool; \??\C:\Users\SWAN\AppData\Local\Temp\VGAOCTool.sys [X] <==== ATTENTION

 

==================== NetSvcs (Whitelisted) ===================

 

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

 

 

==================== One month (created) ===================

 

(If an entry is included in the fixlist, the file/folder will be moved.)

 

2020-03-31 13:12 - 2020-03-31 13:12 - 000248968 _____ (Malwarebytes) C:\WINDOWS\system32\Drivers\mbamswissarmy.sys

2020-03-31 13:12 - 2020-03-31 13:12 - 000214496 _____ (Malwarebytes) C:\WINDOWS\system32\Drivers\MbamChameleon.sys

2020-03-31 11:51 - 2020-03-31 11:54 - 002096052 _____ C:\Users\SWAN\Documents\fadfaf.mp4

2020-03-31 11:39 - 2020-03-31 11:40 - 047864903 _____ C:\Users\SWAN\Downloads\ssk.mp4.sfvp0

2020-03-31 11:39 - 2020-03-31 11:39 - 000024872 _____ C:\Users\SWAN\Downloads\ssk.mp4.sfk

2020-03-31 11:21 - 2020-03-31 11:24 - 054418205 _____ C:\Users\SWAN\Downloads\ssk.mp4

2020-03-31 11:21 - 2020-03-31 11:24 - 004761674 _____ C:\Users\SWAN\Downloads\ssk.wav

2020-03-31 11:14 - 2020-03-31 11:16 - 060716543 _____ C:\Users\SWAN\Downloads\ssw.mp4

2020-03-31 11:14 - 2020-03-31 11:16 - 004761674 _____ C:\Users\SWAN\Downloads\ssw.wav

2020-03-31 10:28 - 2020-03-31 10:28 - 004385554 _____ C:\Users\SWAN\Downloads\Story Odevzdání.rar

2020-03-30 22:39 - 2020-03-30 22:39 - 008661980 _____ C:\Users\SWAN\Desktop\30.3 garage.wav

2020-03-30 14:36 - 2020-03-30 14:36 - 000000000 ____D C:\Users\SWAN\Documents\Custom Office Templates

2020-03-29 18:09 - 2020-03-29 18:09 - 039365282 _____ C:\Users\SWAN\Downloads\Million Stylez - Miss Fatty.wav

2020-03-27 23:04 - 2019-01-28 22:28 - 000000927 _____ C:\Users\SWAN\Desktop\TeamSpeak 3 Client.lnk

2020-03-27 12:00 - 2020-03-27 12:02 - 000083859 _____ C:\Users\SWAN\Desktop\Addition.txt

2020-03-27 11:58 - 2020-03-31 13:41 - 000041781 _____ C:\Users\SWAN\Desktop\FRST.txt

2020-03-26 22:00 - 2020-03-26 22:00 - 000000000 ____D C:\Users\SWAN\Downloads\Xfer_LFOTool_1_6_9_2 [WIN,OSX]

2020-03-22 17:20 - 2020-03-22 17:20 - 039709582 _____ C:\Users\SWAN\Downloads\LANDR-master2-Medium-Balanced.Wav

2020-03-22 15:06 - 2020-03-22 15:08 - 000000000 ____D C:\Users\SWAN\Documents\Mount&Blade Warband

2020-03-22 15:06 - 2020-03-22 15:06 - 000001815 _____ C:\Users\Public\Desktop\Mount&Blade Warband.lnk

2020-03-22 15:05 - 2020-03-22 15:05 - 000000000 ____D C:\Users\SWAN\Documents\Mount&Blade Warband Savegames

2020-03-22 15:04 - 2020-03-22 15:04 - 000000000 ____D C:\Users\SWAN\AppData\Roaming\Paradox Interactive

2020-03-22 15:01 - 2020-03-22 15:03 - 575889150 _____ C:\Users\SWAN\Downloads\Mount and Blade Warband 1.126 + Čeština.rar

2020-03-22 14:59 - 2020-03-22 14:59 - 000125275 _____ C:\Users\SWAN\Downloads\Mount-and-Blade-Warband-Napoleonic-Wars-MULTIPLAYER-Crack-All-Versions.rar.torrent

2020-03-22 14:57 - 2020-03-22 15:01 - 615036714 _____ C:\Users\SWAN\Downloads\mount-blade-warband_1.153.exe

2020-03-22 13:39 - 2020-03-22 13:40 - 001872698 _____ C:\Users\SWAN\Desktop\24.10.wav

2020-03-19 16:43 - 2020-03-19 16:43 - 000654446 _____ C:\Users\SWAN\Downloads\37001837945.pdf

2020-03-19 16:43 - 2020-03-19 16:43 - 000273175 _____ C:\Users\SWAN\Downloads\3700183794.pdf

2020-03-19 16:30 - 2020-03-19 16:31 - 002289956 _____ C:\Users\SWAN\Desktop\3- ss 2.wav

2020-03-18 20:52 - 2020-03-31 10:49 - 058130905 _____ C:\Users\SWAN\Downloads\jan mrdka první.mp4

2020-03-18 20:52 - 2020-03-31 10:49 - 004567040 _____ C:\Users\SWAN\Downloads\jan mrdka prvn�.wav

2020-03-18 13:59 - 2020-02-03 23:41 - 000835688 _____ (Adobe) C:\WINDOWS\SysWOW64\FlashPlayerApp.exe

2020-03-18 13:59 - 2020-02-03 23:41 - 000179608 _____ (Adobe) C:\WINDOWS\SysWOW64\FlashPlayerCPLApp.cpl

2020-03-17 23:46 - 2020-03-17 23:46 - 000000000 ____D C:\ProgramData\ssh

2020-03-17 18:24 - 2020-03-17 18:24 - 002169104 _____ C:\Users\SWAN\Desktop\3 - ss.wav

2020-03-17 18:23 - 2020-03-17 18:23 - 002162744 _____ C:\Users\SWAN\Desktop\2 - ss.wav

2020-03-17 18:22 - 2020-03-17 18:22 - 002174192 _____ C:\Users\SWAN\Desktop\1-ss.wav

2020-03-17 18:21 - 2020-03-17 18:21 - 002203448 _____ C:\Users\SWAN\Desktop\3.wav

2020-03-17 18:20 - 2020-03-17 18:20 - 002202176 _____ C:\Users\SWAN\Desktop\2.wav

2020-03-17 18:19 - 2020-03-17 18:20 - 002203448 _____ C:\Users\SWAN\Desktop\1..wav

2020-03-17 13:53 - 2020-02-01 08:36 - 000801080 _____ (Microsoft Corporation) C:\WINDOWS\system32\sedplugins.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 024617472 _____ (Microsoft Corporation) C:\WINDOWS\system32\Hydrogen.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 020816384 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\edgehtml.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 019284480 _____ (Microsoft Corporation) C:\WINDOWS\system32\HologramWorld.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 012306432 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ieframe.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 011723776 _____ (Microsoft Corporation) C:\WINDOWS\system32\wmp.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 009941504 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wmp.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 007923712 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mstscax.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 005436904 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfcore.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 004488192 _____ (Microsoft Corporation) C:\WINDOWS\system32\xpsrchvw.exe

2020-03-17 13:41 - 2020-03-17 13:41 - 004066816 _____ (Microsoft Corporation) C:\WINDOWS\system32\DHolographicDisplay.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 003629568 _____ (Microsoft Corporation) C:\WINDOWS\system32\tellib.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 003550624 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfcore.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 003442176 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\xpsrchvw.exe

2020-03-17 13:41 - 2020-03-17 13:41 - 002986560 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Mirage.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002751336 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfmp4srcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002469432 _____ (Microsoft Corporation) C:\WINDOWS\system32\msmpeg2vdec.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002429768 _____ (Microsoft Corporation) C:\WINDOWS\system32\WMVCORE.DLL

2020-03-17 13:41 - 2020-03-17 13:41 - 002393600 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AcGenral.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002323688 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msmpeg2vdec.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002273296 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfasfsrcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002182456 _____ (Microsoft Corporation) C:\WINDOWS\system32\workfolderssvc.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 002160160 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\WMVCORE.DLL

2020-03-17 13:41 - 2020-03-17 13:41 - 002100056 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfplat.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001876960 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfsrcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001707208 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfmp4srcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001605000 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfplat.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001430880 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfsrcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001312256 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msjet40.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001296360 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfsvr.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001288648 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfasfsrcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001282944 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfreadwrite.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001267216 _____ (Microsoft Corporation) C:\WINDOWS\system32\SecConfig.efi

2020-03-17 13:41 - 2020-03-17 13:41 - 001229824 _____ (Microsoft Corporation) C:\WINDOWS\system32\HoloSI.PCShell.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001201128 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfmpeg2srcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001166336 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wscui.cpl

2020-03-17 13:41 - 2020-03-17 13:41 - 001076040 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfsvr.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001024712 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfmpeg2srcsnk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 001022464 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Media.MixedRealityCapture.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000936960 _____ (Microsoft Corporation) C:\WINDOWS\system32\assignedaccessmanagersvc.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000870400 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Media.MixedRealityCapture.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000833024 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\webplatstorageserver.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000829440 _____ (Microsoft Corporation) C:\WINDOWS\system32\HologramCompositor.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000808960 _____ (Microsoft Corporation) C:\WINDOWS\system32\cscui.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000763032 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mfreadwrite.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000740352 _____ (Microsoft Corporation) C:\WINDOWS\system32\cscsvc.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000690688 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\CPFilters.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000684544 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000663040 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\EdgeManager.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000662528 ____R (Microsoft Corporation) C:\WINDOWS\system32\MixedRealityCapture.Pipeline.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000654848 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Mirage.Internal.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000629248 _____ (Microsoft Corporation) C:\WINDOWS\system32\AssignedAccessManager.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000594432 _____ (Microsoft Corporation) C:\WINDOWS\system32\HolographicExtensions.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000579072 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\csc.sys

2020-03-17 13:41 - 2020-03-17 13:41 - 000486400 _____ C:\WINDOWS\system32\AssignedAccessCsp.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000454144 _____ (Microsoft Corporation) C:\WINDOWS\system32\bdesvc.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000453632 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\srv.sys

2020-03-17 13:41 - 2020-03-17 13:41 - 000429056 _____ (Microsoft Corporation) C:\WINDOWS\system32\MixedReality.Broker.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000427520 _____ (Microsoft Corporation) C:\WINDOWS\system32\MSFlacDecoder.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000419840 _____ (Microsoft Corporation) C:\WINDOWS\system32\HolographicRuntimes.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000385536 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\provsvc.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000371712 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\MSFlacDecoder.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000363520 _____ (Microsoft Corporation) C:\WINDOWS\system32\rdpinit.exe

2020-03-17 13:41 - 2020-03-17 13:41 - 000350416 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\tsmf.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000273920 _____ (Microsoft Corporation) C:\WINDOWS\system32\MSFlacEncoder.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000263576 _____ (Microsoft Corporation) C:\WINDOWS\system32\mfps.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000254264 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\mssecflt.sys

2020-03-17 13:41 - 2020-03-17 13:41 - 000252928 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\tapisrv.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000249856 _____ (Gracenote, Inc.) C:\WINDOWS\SysWOW64\gnsdk_fp.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000235520 _____ (Microsoft Corporation) C:\WINDOWS\system32\HoloSHExtensions.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000231936 _____ (Microsoft Corporation) C:\WINDOWS\system32\HoloShellRuntime.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000228352 _____ (Microsoft Corporation) C:\WINDOWS\system32\ddpchunk.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000219136 _____ (Microsoft Corporation) C:\WINDOWS\system32\tscfgwmi.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000185344 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Cortana.Analog.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000175104 _____ (Microsoft Corporation) C:\WINDOWS\system32\SettingsHandlers_AnalogShell.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000165888 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wscinterop.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000161280 ____R (Microsoft Corporation) C:\WINDOWS\system32\SecureAssessmentHandlers.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000154624 _____ (Microsoft Corporation) C:\WINDOWS\system32\fcon.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000143872 _____ (Microsoft Corporation) C:\WINDOWS\system32\DesktopView.Internal.Broker.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000121344 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\PrintWSDAHost.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000101888 _____ (Microsoft Corporation) C:\WINDOWS\system32\mssecuser.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000098816 ____R (Microsoft Corporation) C:\WINDOWS\system32\MixedRealityCapture.Broker.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000069120 _____ (Microsoft Corporation) C:\WINDOWS\system32\fveskybackup.dll

2020-03-17 13:41 - 2020-03-17 13:41 - 000063488 _____ (Microsoft Corporation) C:\WINDOWS\system32\LSCSHostPolicy.dll

2020-03-17 13:40 - 2020-03-17 13:41 - 019020288 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mshtml.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 026807296 _____ (Microsoft Corporation) C:\WINDOWS\system32\edgehtml.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 023463424 _____ (Microsoft Corporation) C:\WINDOWS\system32\mshtml.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 013013504 _____ (Microsoft Corporation) C:\WINDOWS\system32\ieframe.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 008907776 _____ (Microsoft Corporation) C:\WINDOWS\system32\mstscax.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 007870976 _____ (Microsoft Corporation) C:\WINDOWS\system32\Chakra.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 006545096 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Media.Protection.PlayReady.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 006445056 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Data.Pdf.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 006318840 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\windows.storage.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 006060544 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Chakra.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 005608120 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\shell32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 005210896 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.StateRepository.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 004872704 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript9.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 004664320 _____ (Microsoft Corporation) C:\WINDOWS\system32\msi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 004628480 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wininet.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 004344832 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ExplorerFrame.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003952760 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Mirage.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003909632 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003860832 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rtmpltfm.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003703808 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript9.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003656792 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\OneCoreUAPCommonProxyStub.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003656704 _____ (Microsoft Corporation) C:\WINDOWS\system32\mispace.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003496448 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.AI.MachineLearning.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003429888 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\cdp.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 003096064 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dwmcore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002942976 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mispace.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002765312 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\tquery.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002349056 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssrch.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002298880 _____ (Microsoft Corporation) C:\WINDOWS\system32\ResetEngine.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002279296 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\iertutil.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002150912 _____ (Microsoft Corporation) C:\WINDOWS\system32\edgeangle.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 002086400 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\xpsservices.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001759232 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\urlmon.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001750528 _____ (Microsoft Corporation) C:\WINDOWS\system32\wwansvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001720936 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\twinapi.appcore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001693696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\DeviceFlows.DataModel.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001675008 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\user32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001656192 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.ApplicationModel.Store.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001647104 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\winmsipc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001606144 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\directml.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001590072 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rdpserverbase.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001573480 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\propsys.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001538560 _____ (Microsoft Corporation) C:\WINDOWS\system32\wbengine.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001506304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Immersive.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001495480 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\d3d9.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001485312 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\GdiPlus.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001480192 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Devices.Bluetooth.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001476096 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\aadtb.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001465344 _____ (Microsoft Corporation) C:\WINDOWS\system32\wsecedit.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001465264 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\gdi32full.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001427592 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dcomp.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001388032 _____ (Microsoft Corporation) C:\WINDOWS\system32\bcastdvruserservice.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001323008 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wsecedit.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001309696 _____ (Microsoft Corporation) C:\WINDOWS\system32\webplatstorageserver.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001294336 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Media.Speech.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001292800 _____ (Microsoft Corporation) C:\WINDOWS\system32\GamePanel.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001292288 _____ (Microsoft Corporation) C:\WINDOWS\system32\werconcpl.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001278808 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Taskmgr.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001249280 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\InstallService.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001247856 _____ (Microsoft Corporation) C:\WINDOWS\system32\ClipUp.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001224704 _____ (Microsoft Corporation) C:\WINDOWS\system32\reseteng.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001223168 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\cdprt.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001222456 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rdpbase.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001219584 _____ (Microsoft Corporation) C:\WINDOWS\system32\sdclt.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001193984 _____ (Microsoft Corporation) C:\WINDOWS\system32\sdengin2.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001182720 _____ (Microsoft Corporation) C:\WINDOWS\system32\wscui.cpl

2020-03-17 13:40 - 2020-03-17 13:40 - 001122304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\XpsPrint.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001076224 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rdpcore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001071616 _____ (Microsoft Corporation) C:\WINDOWS\HelpPane.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 001062400 _____ (Microsoft Corporation) C:\WINDOWS\system32\sysmain.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001051136 _____ (Microsoft Corporation) C:\WINDOWS\system32\clusapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001027000 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ole32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001022976 _____ (Microsoft Corporation) C:\WINDOWS\system32\MCRecvSrc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 001000448 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wpnapps.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000993280 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\comdlg32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000988672 _____ (Microsoft Corporation) C:\WINDOWS\system32\StorSvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000982528 _____ (Microsoft Corporation) C:\WINDOWS\system32\Spectrum.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000980320 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rtmpal.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000976384 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Cred.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000964096 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SettingSyncCore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000961024 _____ (Microsoft Corporation) C:\WINDOWS\system32\CBDHSvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000949760 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Mirage.Internal.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000946688 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\GamePanel.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000926056 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Devices.Sensors.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000915296 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rtmcodecs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000914432 _____ (Microsoft Corporation) C:\WINDOWS\system32\Microsoft.Graphics.Display.DisplayEnhancementService.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000912384 _____ (Microsoft Corporation) C:\WINDOWS\system32\EdgeManager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000908800 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mmsys.cpl

2020-03-17 13:40 - 2020-03-17 13:40 - 000883200 _____ (Microsoft Corporation) C:\WINDOWS\system32\CPFilters.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000879104 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchIndexer.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000876032 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rasapi32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000866304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rasdlg.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000852480 _____ (Microsoft Corporation) C:\WINDOWS\system32\ieproxy.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000850432 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\MCRecvSrc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000849920 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rasgcw.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000845824 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ShareHost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000840192 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000828728 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SettingSyncHost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000821760 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\NPSMDesktopProvider.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000805504 _____ (Microsoft Corporation) C:\WINDOWS\system32\BioIso.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000801280 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\winipcsecproc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000796160 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\clusapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000791864 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\CloudExperienceHostCommon.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000774968 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Services.TargetedContent.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000774656 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SndVolSSO.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000741376 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssvp.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000732000 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ortcengine.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000727040 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\MsSpellCheckingFacility.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000721920 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AppContracts.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000718944 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.ApplicationModel.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000712192 _____ (Microsoft Corporation) C:\WINDOWS\system32\odbc32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000708096 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Search.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000703488 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript9diag.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000687104 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.AccountsControl.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000685568 _____ (Microsoft Corporation) C:\WINDOWS\system32\rdbui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000681472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\uReFS.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000676352 _____ (Microsoft Corporation) C:\WINDOWS\system32\sud.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000673792 _____ (Microsoft Corporation) C:\WINDOWS\system32\wiaaut.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000671232 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ntshrui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000664064 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Internal.Management.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000661056 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\fontdrvhost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000658944 _____ (Microsoft Corporation) C:\WINDOWS\system32\RDXService.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000651776 _____ (Microsoft Corporation) C:\WINDOWS\system32\wiaservc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000651264 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\twinui.appcore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000648392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AppXDeploymentClient.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000642560 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\sud.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000642048 _____ (Microsoft Corporation) C:\WINDOWS\system32\SharedRealitySvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000628736 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript9diag.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000616960 _____ (Microsoft Corporation) C:\WINDOWS\system32\NgcIsoCtnr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000615936 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Core.TextInput.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000604672 _____ (Microsoft Corporation) C:\WINDOWS\system32\facecredentialprovider.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000604248 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\windows.applicationmodel.datatransfer.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000589824 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ActivationManager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000576512 _____ (Microsoft Corporation) C:\WINDOWS\system32\dfrgui.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000574864 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Perception.Stub.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000572416 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wiaaut.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000560640 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dfrgui.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000557056 _____ (Microsoft Corporation) C:\WINDOWS\system32\PerceptionSimulationExtensions.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000555440 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SHCore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000548864 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\cryptui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000547328 _____ (Microsoft Corporation) C:\WINDOWS\system32\VAN.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000545792 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\efswrt.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000542504 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\TextInputFramework.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000541472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\StructuredQuery.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000533504 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\vbscript.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000522104 _____ (Microsoft Corporation) C:\WINDOWS\system32\systemreset.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000517632 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\iprtrmgr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000506368 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Internal.PredictionUnit.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000496128 _____ (Microsoft Corporation) C:\WINDOWS\system32\werui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000492032 _____ (Microsoft Corporation) C:\WINDOWS\system32\defragsvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000486912 _____ (Microsoft Corporation) C:\WINDOWS\system32\srcore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000473832 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\policymanager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000468480 _____ (Microsoft Corporation) C:\WINDOWS\system32\provsvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000462336 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dmenrollengine.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000461488 _____ (Microsoft Corporation) C:\WINDOWS\system32\NgcIso.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000460800 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\UiaManager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000456192 _____ (Microsoft Corporation) C:\WINDOWS\system32\upnphost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000453208 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AppResolver.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000444416 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\intl.cpl

2020-03-17 13:40 - 2020-03-17 13:40 - 000441344 _____ (Microsoft Corporation) C:\WINDOWS\system32\DeviceCenter.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000439808 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ngccredprov.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000434176 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\TileDataRepository.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000430592 _____ (Microsoft Corporation) C:\WINDOWS\system32\rdpclip.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000428544 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\werui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000426496 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Internal.Bluetooth.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000425984 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\daxexec.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000411136 _____ (Microsoft Corporation) C:\WINDOWS\system32\RDXTaskFactory.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000410616 _____ (Microsoft Corporation) C:\WINDOWS\system32\tsmf.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000408528 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Devices.Enumeration.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000401920 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\DeviceCenter.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000395776 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\puiobj.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000374784 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\zipfldr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000373560 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\coml2.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000370176 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ieproxy.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000364544 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\LockAppBroker.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000359424 _____ (Microsoft Corporation) C:\WINDOWS\system32\dusmsvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000353792 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msrd3x40.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000353792 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\DictationManager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000350208 _____ (Microsoft Corporation) C:\WINDOWS\system32\AcGenral.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000349184 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchProtocolHost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000348672 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rdpencom.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000348672 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\PhoneOm.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000331264 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\upnphost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000330752 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\edgeIso.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000329728 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AboveLockAppHost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000324096 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchFolder.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000322048 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\cryptngc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000322048 _____ (Microsoft Corporation) C:\WINDOWS\system32\sti.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000312632 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\thumbcache.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000310784 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Phoneutil.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000310784 _____ (Microsoft Corporation) C:\WINDOWS\system32\tapisrv.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000310272 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.ApplicationModel.LockScreen.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000301568 _____ (Microsoft Corporation) C:\WINDOWS\system32\DAFIPP.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000297472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\DataExchange.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000296448 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wpnclient.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000296448 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Search.ProtocolHandler.MAPI2.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000289792 _____ (Microsoft Corporation) C:\WINDOWS\system32\discan.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000287744 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Gaming.Preview.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000279416 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\BCP47Langs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000277840 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\biwinrt.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000276480 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AppLockerCSP.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000269312 _____ (Microsoft Corporation) C:\WINDOWS\system32\rstrui.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000267264 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\LockScreenData.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000263168 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\credprovs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000259072 _____ (Microsoft Corporation) C:\WINDOWS\system32\PerceptionSimulationManager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000251392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\XpsDocumentTargetPrint.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000250880 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ConsoleLogon.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000250880 _____ (Microsoft Corporation) C:\WINDOWS\system32\FileHistory.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000249344 _____ (Microsoft Corporation) C:\WINDOWS\system32\srrstr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000248832 _____ (Microsoft Corporation) C:\WINDOWS\system32\IndexedDbLegacy.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000243216 _____ (Microsoft Corporation) C:\WINDOWS\system32\DataExchangeHost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000241152 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msltus40.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000241152 _____ (Microsoft Corporation) C:\WINDOWS\system32\ResetEngOnline.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000239664 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ExecModelClient.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000238080 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.CredDialogController.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000233472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.ApplicationModel.Store.TestingFramework.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000228864 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\sti.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000228352 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wlidcredprov.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000224256 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchFilterHost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000218624 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Cortana.Persona.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000218624 _____ (Microsoft Corporation) C:\WINDOWS\system32\wscinterop.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000217600 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\bthprops.cpl

2020-03-17 13:40 - 2020-03-17 13:40 - 000217088 _____ (Microsoft Corporation) C:\WINDOWS\system32\DWWIN.EXE

2020-03-17 13:40 - 2020-03-17 13:40 - 000215552 _____ (Microsoft Corporation) C:\WINDOWS\system32\ContactHarvesterDS.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000212480 _____ (Microsoft Corporation) C:\WINDOWS\system32\DiagSvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000205312 _____ C:\WINDOWS\SysWOW64\HeatCore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000201728 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mdmregistration.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000198656 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\RstrtMgr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000196608 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\feclient.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000194048 _____ (Microsoft Corporation) C:\WINDOWS\system32\recdisc.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000192512 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\IndexedDbLegacy.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000189440 _____ (Microsoft Corporation) C:\WINDOWS\system32\sti_ci.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000186880 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\enrollmentapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000186880 _____ (Microsoft Corp.) C:\WINDOWS\system32\Defrag.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000180736 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\DWWIN.EXE

2020-03-17 13:40 - 2020-03-17 13:40 - 000180224 _____ (Microsoft Corporation) C:\WINDOWS\system32\rdsdwmdr.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000177664 _____ (Microsoft Corporation) C:\WINDOWS\system32\spacebridge.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000176112 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\deviceaccess.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000175928 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Management.Workplace.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000167424 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\InstallServiceTasks.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000165888 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\MicrosoftAccountTokenProvider.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000164864 _____ (Microsoft Corporation) C:\WINDOWS\system32\edpcsp.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000162816 _____ (Microsoft Corporation) C:\WINDOWS\system32\EDPCleanup.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000162304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.StateRepositoryUpgrade.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000162304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AuthBroker.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000160256 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Internal.Devices.Sensors.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000159744 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wincredui.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000157696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\NPSM.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000157184 _____ (Microsoft Corporation) C:\WINDOWS\system32\PrintWSDAHost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000156160 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Storage.OneCore.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000156160 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssph.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000155136 _____ (Microsoft Corporation) C:\WINDOWS\system32\Chakradiag.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000154112 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\twext.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000152064 _____ (Microsoft Corporation) C:\WINDOWS\system32\fdWSD.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000150528 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\useractivitybroker.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000149504 _____ (Microsoft Corporation) C:\WINDOWS\system32\sdrsvc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000148992 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\oledlg.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000148480 _____ (Microsoft Corporation) C:\WINDOWS\system32\MDMAppInstaller.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000145920 _____ (Microsoft Corporation) C:\WINDOWS\system32\wiadss.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000143360 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\BitLockerCsp.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000140304 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dwmapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000139776 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\prntvpt.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000138752 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\t2embed.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000134656 _____ (Microsoft Corporation) C:\WINDOWS\system32\dnscmmc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000128616 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\omadmapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000127488 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\fdWSD.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000124440 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dmcmnutils.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000123392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.XamlHost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000123392 _____ (Microsoft Corporation) C:\WINDOWS\system32\wercplsupport.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000119808 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wiadss.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000117248 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Chakradiag.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000112128 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\globinputhost.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000108392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Graphics.Display.DisplayEnhancementOverride.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000108032 _____ (Microsoft Corporation) C:\WINDOWS\system32\fdSSDP.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000107520 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\olecli32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000107008 _____ C:\WINDOWS\SysWOW64\WindowsDefaultHeatProcessor.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000106496 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\olethk32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000106048 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\OpenWith.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000104448 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\GraphicsCapture.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000098816 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\fontsub.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000096256 _____ (Microsoft Corporation) C:\WINDOWS\system32\msfeedsbs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000094496 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\PickerHost.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000089088 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\fdSSDP.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000088576 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\UserAccountControlSettings.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000083968 _____ (Microsoft Corporation) C:\WINDOWS\system32\wiarpc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000080384 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msfeedsbs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000079360 _____ (Microsoft Corporation) C:\WINDOWS\system32\ProvSysprep.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000078336 _____ (Microsoft Corporation) C:\WINDOWS\system32\fhuxgraphics.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000078336 _____ (Microsoft Corporation) C:\WINDOWS\system32\ComputerDefaults.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000077824 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\usp10.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000072192 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Devices.Custom.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000071680 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\CapabilityAccessManagerClient.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000070656 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\usoapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000068096 _____ (Microsoft Corporation) C:\WINDOWS\system32\udhisapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000066560 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\enterpriseresourcemanager.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000066048 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Devices.Background.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000066048 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ComputerDefaults.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000065536 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\CredProvHelper.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000064512 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ApiSetHost.AppExecutionAlias.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000059904 _____ (Microsoft Corporation) C:\WINDOWS\system32\RDSPnf.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000059392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\clfsw32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000058368 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\udhisapi.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000057856 _____ (Microsoft Corporation) C:\WINDOWS\system32\SrTasks.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000057344 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\olesvr32.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000055376 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rtmmvrortc.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000054784 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msscntrs.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000052736 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rtutils.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000050688 _____ (Microsoft Corporation) C:\WINDOWS\system32\NAPCRYPT.DLL

2020-03-17 13:40 - 2020-03-17 13:40 - 000047104 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AssignedAccessRuntime.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000046080 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mf3216.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000046080 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\LocationFrameworkInternalPS.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000041472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\compact.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000039936 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.System.Profile.SystemManufacturers.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000038912 _____ (Adobe Systems) C:\WINDOWS\SysWOW64\atmlib.dll

2020-03-17 13:40 - 2020-03-17 13:40 - 000032256 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rasphone.exe

2020-03-17 13:40 - 2020-03-17 13:40 - 000018944 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msauserext.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 022137120 _____ (Microsoft Corporation) C:\WINDOWS\system32\shell32.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 015220224 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Xaml.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 009672208 _____ (Microsoft Corporation) C:\WINDOWS\system32\ntoskrnl.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 006942720 _____ (Microsoft Corporation) C:\WINDOWS\system32\twinui.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 005915936 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\d3d10warp.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 005777408 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\twinui.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 005575168 _____ (Microsoft Corporation) C:\WINDOWS\system32\twinui.pcshell.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 005309080 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\d2d1.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 005086208 _____ (Microsoft Corporation) C:\WINDOWS\system32\wininet.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 004898144 _____ (Microsoft Corporation) C:\WINDOWS\system32\rtmpltfm.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 004736512 _____ (Microsoft Corporation) C:\WINDOWS\system32\ExplorerFrame.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 004589056 _____ (Microsoft Corporation) C:\WINDOWS\system32\sppsvc.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 004303872 _____ (Microsoft Corporation) C:\WINDOWS\system32\SettingsHandlers_nt.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 004018688 _____ (Microsoft Corporation) C:\WINDOWS\system32\SystemSettingsThresholdAdminFlowUI.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 003873704 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\explorer.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 003490304 _____ (Microsoft Corporation) C:\WINDOWS\system32\dwmcore.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 003416576 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Xaml.Controls.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002981888 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.UI.Logon.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002917688 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\tcpip.sys

2020-03-17 13:39 - 2020-03-17 13:39 - 002893312 _____ (Microsoft Corporation) C:\WINDOWS\system32\themeui.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002879488 _____ (Microsoft Corporation) C:\WINDOWS\system32\xpsservices.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002871824 _____ (Microsoft Corporation) C:\WINDOWS\system32\aitstatic.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 002832896 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\themeui.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002779272 _____ (Microsoft Corporation) C:\WINDOWS\system32\iertutil.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002770944 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msftedit.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002701816 _____ (Microsoft Corporation) C:\WINDOWS\system32\KernelBase.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002698752 _____ (Microsoft Corporation) C:\WINDOWS\system32\WebRuntimeManager.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002627088 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\ntfs.sys

2020-03-17 13:39 - 2020-03-17 13:39 - 002264344 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\d3d11.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 002074984 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\KernelBase.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001994768 _____ (Microsoft Corporation) C:\WINDOWS\system32\ntdll.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001962296 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\refs.sys

2020-03-17 13:39 - 2020-03-17 13:39 - 001961984 _____ (Microsoft Corporation) C:\WINDOWS\system32\DeviceFlows.DataModel.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001899160 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AudioEng.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001890816 _____ (Microsoft Corporation) C:\WINDOWS\system32\msctfuimanager.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001886208 _____ (Microsoft Corporation) C:\WINDOWS\system32\msxml3.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001862656 _____ (Microsoft Corporation) C:\WINDOWS\system32\urlmon.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001837136 _____ (Microsoft Corporation) C:\WINDOWS\system32\dcomp.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001818624 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Media.Speech.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001804288 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msctfuimanager.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001761280 _____ (Microsoft Corporation) C:\WINDOWS\system32\dui70.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001753088 _____ (Microsoft Corporation) C:\WINDOWS\system32\ConstraintIndex.Search.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001751640 _____ (Microsoft Corporation) C:\WINDOWS\system32\sppobjs.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001729024 _____ (Microsoft Corporation) C:\WINDOWS\system32\CoreShell.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001726480 _____ (Microsoft Corporation) C:\WINDOWS\system32\appraiser.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001711104 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.UI.Immersive.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001708544 _____ (Microsoft Corporation) C:\WINDOWS\system32\enterprisecsps.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001702600 _____ (Microsoft Corporation) C:\WINDOWS\system32\winload.efi

2020-03-17 13:39 - 2020-03-17 13:39 - 001702400 _____ (Microsoft Corporation) C:\WINDOWS\system32\GdiPlus.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001688064 _____ (Microsoft Corporation) C:\WINDOWS\system32\XpsPrint.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001678800 _____ (Microsoft Corporation) C:\WINDOWS\system32\d3d9.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001674696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ntdll.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001668752 _____ (Microsoft Corporation) C:\WINDOWS\system32\gdi32full.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001568768 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.UI.Cred.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001484384 _____ (Microsoft Corporation) C:\WINDOWS\system32\msctf.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001473080 _____ (Microsoft Corporation) C:\WINDOWS\system32\winload.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 001458056 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\D3D12.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001395056 _____ (Microsoft Corporation) C:\WINDOWS\system32\ole32.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001390888 _____ (Microsoft Corporation) C:\WINDOWS\system32\Taskmgr.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 001382912 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Input.Inking.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001360912 _____ (Microsoft Corporation) C:\WINDOWS\system32\Drivers\ndis.sys

2020-03-17 13:39 - 2020-03-17 13:39 - 001354080 _____ (Microsoft Corporation) C:\WINDOWS\system32\rtmpal.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001346192 _____ (Microsoft Corporation) C:\WINDOWS\system32\winresume.efi

2020-03-17 13:39 - 2020-03-17 13:39 - 001319936 _____ (Microsoft Corporation) C:\WINDOWS\system32\NotificationController.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001287072 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Devices.Sensors.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001272360 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ContentDeliveryManager.Utilities.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001267712 _____ (Microsoft Corporation) C:\WINDOWS\system32\APMon.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001262592 _____ (Microsoft Corporation) C:\WINDOWS\system32\SystemSettings.Handlers.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001257472 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\TokenBroker.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001255936 _____ (Microsoft Corporation) C:\WINDOWS\system32\usermgr.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001183504 _____ (Microsoft Corporation) C:\WINDOWS\system32\winresume.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 001180248 _____ (Microsoft Corporation) C:\WINDOWS\system32\rpcrt4.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001169920 _____ (Microsoft Corporation) C:\WINDOWS\system32\comdlg32.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001162088 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Internal.Shell.Broker.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001145856 _____ (Microsoft Corporation) C:\WINDOWS\system32\SettingSyncCore.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001125392 _____ (Microsoft Corporation) C:\WINDOWS\system32\efscore.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001098128 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\AudioSes.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001091936 _____ (Microsoft Corporation) C:\WINDOWS\system32\rtmcodecs.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001056272 _____ (Microsoft Corporation) C:\WINDOWS\system32\pidgenx.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001036800 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Web.Http.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001032544 _____ (Microsoft Corporation) C:\WINDOWS\system32\ortcengine.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 001012224 _____ (Microsoft Corporation) C:\WINDOWS\system32\refsutil.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 001001472 _____ (Microsoft Corporation) C:\WINDOWS\system32\mmsys.cpl

2020-03-17 13:39 - 2020-03-17 13:39 - 000998928 _____ (Microsoft Corporation) C:\WINDOWS\system32\SettingSyncHost.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 000964984 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000954368 _____ (Microsoft Corporation) C:\WINDOWS\system32\rasapi32.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000953344 _____ (Microsoft Corporation) C:\WINDOWS\system32\rasgcw.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000950272 _____ (Microsoft Corporation) C:\WINDOWS\system32\rasdlg.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000949248 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.Internal.Management.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000947200 _____ (Microsoft Corporation) C:\WINDOWS\system32\uDWM.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000934912 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.UI.Xaml.Phone.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000930816 _____ (Microsoft Corporation) C:\WINDOWS\system32\SecurityHealthSSO.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000927232 _____ (Microsoft Corporation) C:\WINDOWS\system32\rasmans.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000917816 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ReAgent.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000909824 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\fontext.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000909824 _____ (Microsoft Corporation) C:\WINDOWS\system32\MsSpellCheckingFacility.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000909624 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\WWAHost.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 000902656 _____ (Microsoft Corporation) C:\WINDOWS\system32\Windows.UI.Search.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000872448 _____ (Microsoft Corporation) C:\WINDOWS\system32\schedsvc.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000860160 _____ C:\WINDOWS\system32\MBR2GPT.EXE

2020-03-17 13:39 - 2020-03-17 13:39 - 000846848 _____ (Microsoft Corporation) C:\WINDOWS\system32\PhoneProviders.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000834048 _____ (Microsoft Corporation) C:\WINDOWS\system32\iphlpsvc.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000823296 _____ (Microsoft Corporation) C:\WINDOWS\system32\SndVolSSO.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000818688 _____ (Microsoft Corporation) C:\WINDOWS\system32\MdmDiagnostics.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000811536 _____ (Microsoft Corporation) C:\WINDOWS\system32\generaltel.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000808272 _____ (Microsoft Corporation) C:\WINDOWS\system32\fontdrvhost.exe

2020-03-17 13:39 - 2020-03-17 13:39 - 000803328 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Security.Authentication.OnlineId.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000801792 _____ (Microsoft Corporation) C:\WINDOWS\system32\uReFS.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000794112 _____ (Microsoft Corporation) C:\WINDOWS\system32\LogonController.dll

2020-03-17 13:39 - 2020-03-17 13:39 - 000791040 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\Windows.Security.Authentication.Web.Core.dll

 


Источник: [https://torrent-igruha.org/3551-portal.html]
Category: N/A

Share Embed Donate

Report this link



Short Description

Download More to Read 1...

Description

MORE

TO

READ

I Eleven years after publishing RAW I and RAW II, the Department of Basic English continues the series with two new reading books. MORE TO READ I is the first book of the new series aiming to improve the reading skills of Beginner and Elementary level students and thus to help them become better readers. The Department is grateful to Necmiye Türkan and Canset Cezairlioğlu Türkan for their meticulous work on compiling and editing the material in this book and preparing it for publication. They put a lot of time and effort to achieve the quality we aimed for.

Ayçe Barışık Chairperson Department of Basic English, School of Foreign Languages Middle East Technical University

Eleven years after publishing RAW I and RAW II, the Department of Basic English continues the series with two new reading books. MORE TO READ I is the first book of the new series aiming to improve the reading skills of Beginner and Elementary level students and thus to help them become better readers. The Department is grateful to Necmiye Türkan and Canset Cezairlioğlu Türkan for their meticulous work on compiling and editing the material in this book and preparing it for publication. They put a lot of time and effort to achieve the quality we aimed for.

Ayçe Barışık Chairperson Department of Basic English, School of Foreign Languages Middle East Technical University

Foreword The purpose of this book is to provide students with extra reading and vocabulary tasks to improve their language. The reading texts in the book have been compiled from quizzes and midterms prepared at the DBE for the Beginner, Elementary, Prep and Pre-intermediate Groups between the years 2000 and 2005. Besides reading texts, there are also vocabulary activities prepared to practice the words listed in the Academic Vocabulary List at the end of the book. Although this book is intended for the Beginner, Elementary, and Pre-intermediate students of DBE, we believe that it will also cater for the needs of EFL students in other institutions. Canset Cezairlioglu Türkan Necmiye Türkan Ankara, 2006

Acknowledgements We would like to express our sincere appreciation to all of those people who have helped to shape this book. First and foremost, we would like to thank all Beginner, Elementary, Prep and Preintermediate Group test writers between 2000 and 2005. We also owe a special debt to Robert West, who meticulously proofread and edited the material in the book. We would also like to thank Steve Riva, Beth Doğan, Gary Conlan and Patricia Bilikmen for their invaluable proofreading. We also thank Nurcihan Karık, who formatted the material and Umut Kahraman, who created a software program that enabled us to prepare the vocabulary tasks. Our continuing thanks are due to: Eva Banu Cantürk, Sedef Şener, Hilal Dinçer, Deniz Atikoğlu and Ayşen Karabağ for their continuous support, Hüsnü Enginarlar and Ayçe Barışık, who provided us with a comfortable working environment. Finally, we are grateful to all our colleagues without whose support and encouragement the compilation and preparation of this book would not have been possible. Canset Cezairlioğlu Türkan Necmiye Türkan Ankara, 2006

1 Sonia And Sam Sam, 54, is from Rosebud, a small town in New Jersey. Rosebud looks like many other towns in the United States. On Main Street, there is a post office and a bank. There is a bookshop between the post office and the bank. Opposite the bank, there is a shopping centre with a supermarket and a clothes shop. Sam's office is next to the post office. Everybody in town knows Sam. He is a good doctor. He is short with dark hair and brown eyes. His wife's name is Sonia. She is tall with blond hair and blue eyes. She is an engineer and she works for a large company in New York City. Every day, she takes the train to the city. Sonia and Sam live in an old white house on Cleveland Road. They have two children, Ted and Jane. Ted lives in Brazil with his wife, Maria, and Jane lives in Alaska. Ted and Jane's rooms are always ready for them, and sometimes they come to visit. At the weekend, Sonia and Sam work in the garden. Sonia grows flowers and Sam has a large vegetable garden. He likes cooking special meals for their friends using their own fresh vegetables.

2 Los Angeles — The City of Angels Los Angeles (LA) is the second largest city in America. It's also home to film stars, sunny weather, tall buildings and heavy traffic. ACCOMMODATION The hotels in LA are more expensive than those in many other American cities, but they are clean and safe. The Biltmore and The Omni are lovely, and close to special bus stops where you can get cheap rides to various sights. PLACES TO VISIT There are many interesting places you can visit, like Venice Beach with its street performers, Universal Studios to see how they make films, and Griffith Park. You can also see the handprints and footprints of film stars outside Grauman's Chinese Theater. Children can visit the Children's Museum — one of the most exciting museums in the world. EATING OUT There are famous restaurants you can eat at, like the Buffalo Club, a place packed with famous people, or Musso & Frank's, Hollywood's oldest restaurant. For the most delicious Mexican dishes, eat at the Border Grill. SHOPPING You can buy cheap fashionable clothes on Melrose Avenue. Do you want designer clothes? Then go to the expensive shops on Rodeo Drive. A visit there is always unforgettable. ENTERTAINMENT The nightlife is exciting on the Sunset Strip, an area in Hollywood with famous clubs like The Whiskey and The Roxy. There you can enjoy rock 'n' roll music. Also, 24-hour cafes like Van Go's Ear are popular with visitors. LA is a modern city with something for everyone. It's noisy and crowded, but it's also fascinating.

3 Computers And Girls The girls in the sixth-grade class in East Palo Alto, California, all have the same access to computers as boys. That is to say, boys and girls both have computers which they can use. However, studies show that by the time girls get to high school, they use computers less than boys, and this causes a technology gap. Janice Weinman of the American Association of University Women says, "Girls tend to be less comfortable than boys with the computer. They use it more to type letters, reports, etc. rather than to find ways of dealing with problems." The studies show that girls make up only a small percentage of students in computer science classes. Girls usually say that they have less computer ability than boys do. They are less confident when using computers. Besides, they use computers less often than boys outside the classroom. The instructor of the computer lab in Cesar Chavez School says, "Boys are not so afraid they might do something that will harm the computer, whereas girls are afraid they might cause damage somehow." Six years ago, the software company Purple Moon also noticed that girls' computer usage was falling behind boys'. Karen Gould of Purple Moon says, "The number-one reason girls don't like computer games is not because they're too violent or too competitive. Girls just find them incredibly boring." According to the study conducted by Purple Moon, girls want games with people similar to those around them and stories about what is going on in their own lives. Karen Gould says, "there is no real reason why girls wouldn't want to play on a computer; it is just a content thing." The sponsor of the study says that the technology gap, which separates the girls from the boys, must be closed if women want to compete effectively with men in the job market in the 21st century.

4 Different Countries, Different Eating Habits Brazil Brazilians don't like eating alone. They like eating with their friends and family at home or in restaurants. They never have lunch at the office and they eat very late at night — at about ten o'clock. Brazilians like strong coffee in small cups at any time of the day. They make many different fruit drinks and also very good beer. They don't eat on the street or on the bus, and they never eat with their hands. They eat pizza and sandwiches with a knife and fork. The Philippines Many Filipinos have three meals a day with two snacks in between. Rice is a part of every meal. People make desserts with it. Filipinos like eating soup, meat, vegetables and a lot of different sauces. In some parts of the country, they make wine. Filipinos usually eat with their families. They eat with a fork and a spoon, or with their hands. It's polite to leave a little food on the plate at the end of a meal. Finland In Finland, there are a lot of different dishes. Smoked fish and hot soups are some examples of these dishes. In Finland, fast food includes pizza and sausages, and they are very popular. On the streets, there are stalls and they sell sausages, Finland's favorite food. Finnish people drink a lot of beer. You can buy excellent Finnish beer in every shop in the country. During the week, most families don't usually have dinner together. Sometimes, at the weekends, they eat with their friends. They cook meals together, or each person makes and brings a part of the meal.

5 The Amish The Amish are a special group of Americans. There are about 85,000 Amish people in the United States. The largest groups live in Ohio, Pennsylvania, Indiana, Iowa and Illinois. The Amish people keep apart from the rest of the world. They live in their own groups; they have their own language and they don't have any relationship with the outside world. The Amish have a simple life. They grow vegetables and fruits, but they don't have machines on their farms. They don't drive cars. They have horses. They do not have electricity or telephones in their homes. The Amish are called 'the plain people'. They all wear the same style of clothes. For example, the men all wear dark clothes and hats; the women wear long dresses and hats. Amish children have one-room school houses. They have Amish teachers. They have no school after the eighth grade.

6 The Man With The Gloves Michael Greenberg is a popular man. He is not famous in sports or in the arts, but people, especially poor people, on the streets of New York know about him. For these poor people, he is not Michael or even Mr. Greenberg. For them, he is "Gloves". "Here comes Gloves," they say when they see him walking down the street. How did he get that name? Mr. Greenberg looks like any other businessman. He wears a suit and carries a briefcase, but he is different. In his briefcase there are not only papers and books but also several pairs of gloves. On cold winter days, Mr. Greenberg does not walk quickly down the street like other New Yorkers. He looks around at people; he looks for poor people with cold hands. That is why he carries gloves in his briefcase. He stops when he sees someone poor with no gloves and gives him or her a pair of gloves. Every day during the winter, Mr. Greenberg gives away gloves. During the rest of the year, he buys gloves. Also, people who know about him send him gloves. He has a mountain of gloves in his apartment. There are gloves of all colors and sizes: children's gloves, work gloves, and evening gloves for ladies. Why does Mr. Greenberg help these people? When he was a child, his family was poor. However, his father always gave things to other people. He thought it made everyone happier. Michael Greenberg feels the same way. He feels very happy when helping the poor.

7 The Statue Of Liberty The Statue of Liberty, a universal symbol of freedom and democracy, is on Liberty Island in New York Harbor. It was a gift from the people of France to the people of the United States. The French sculptor Frédéric Auguste Bartholdi designed the Statue. He started to build the Statue in France in the year 1B75 and the construction finished in 1886. A French ship called the "Isere" brought it to the USA in 350 pieces the same year. Workers spent 4 months to put them together. The Statue is 93 meters tall from the ground to the tip of the torch. Visitors climb 354 steps or take the elevator to reach the crown. There are 25 windows in the crown. Visitors can rest, take photos and enjoy the scenery of New York City there. The seven rays of the Statue's crown symbolize the seven seas and seven continents of the world. The Lady with the Lamp holds a tablet in her left hand. It reads "July 4, 1776" (in Roman numerals), the Independence Day of America. There is a museum in the pedestal. More than 5 million people visit it each year and learn about its history there. The only way to get to the Statue is by ferryboat. Ferryboats take visitors to the Island every 30 minutes. The entrance to the Statue is free, but the ferry tickets cost $10 for adults and $4 for children aged 4-12. Children under 4 don't pay any money.

8 A New Artist in New York A new show of paintings opened in New York last week. The name of the artist is Maria Arroyo. People in New York don't know her, but she is quite famous in some other countries. She grew up in Mexico. She studied with several famous artists there. In 1995, she married Ted Diamond, a reporter for the New York Gazette. The same year, Maria and Ted moved to Brazil. Maria won a lot of important awards in Brazil, and she showed her work in Mexico and other countries. Her work is very popular in these countries now. Maria Arroyo is a small, quiet person, but her paintings are very large. They are full of color and excitement. She says that she uses Mexican colors. In Mexico, the sky and the sea are usually very bright blue. The houses often have bright colors too: pink, yellow, or orange. In her paintings, the excitement comes partly from these colors. It also comes from her style. She paints large forms that seem to move. Mario Arroyo's paintings aren't like photographs. They do not show us houses, flowers, clouds or boats. Instead, her paintings show us her feelings about the world. We look forward to seeing more work from this excellent artist. The New York Times by Sandra Woolf

9 An All-Boy Band The Backstreet Boys, or BSB, is an American all-boy band. The band started with Howie Dorough, AJ McLean and Nick Carter. AJ worked as a model when he was six. At that time, he also acted in school plays. When he was fourteen, he met Howie. Howie had had roles in films and plays. They became friends and went to auditions together. They met Nick at one of them. AJ, Howie, and Nick started singing together for a record company called Transcontinental Records. The record company owner, Lou Perlman, had a friend who knew Kevin Richardson. Kevin had a job at Disney World in Orlando at the time. When Lou's friend told Kevin about the new group, Kevin decided to meet them. The four became friends and Kevin joined the group. Lou wanted one more person for the group. The fifth member was Brian Littrell, Kevin's cousin. BSB released their first album in 1996. They received a gold record for this album. The second one followed in late 1997, but it was not as successful as the first. BSB has got fans in many countries. You might even be a fan of this great band. If you want to write to them, here is the address: Backstreet Boys, Post Office Box 618203, Orlando, FL 32861-8203.

10 Buddy Holly Buddy Holly was born in the small town of Lubbock, in the state of Texas, on 7th September, 1936. His name then was Charles Hardin Holly, not 'Buddy Holly'. In his short life, he became one of the greatest rock 'n' roll musicians of the 1950s. In January 1959, Buddy Holly began a concert tour with some other musicians. They were on tour for nearly a month, going from one place to another every day. On 2nd February, they were in Iowa, in the central United States, and they were very tired. That night, after the concert, Buddy made a suggestion. "Let's go to our next concert by plane tonight." The other musicians liked Buddy's idea. They immediately said "yes". The same night at 1 a.m., Buddy and his two friends were on the plane. They were on their way to Minnesota for their next concert. It was a cold and windy night. It was snowing too. Then, something bad happened. People saw the lights of the small plane come slowly down and down. Suddenly, they disappeared. Maybe it was the pilot's mistake, or maybe there was a technical problem, but no one found out the reason for the accident. Buddy Holly, one of the great American rock stars, and his two friends died tragically in the accident. He was only 23 years old.

11 Tiku My name is Tiku. I am an Aborigine from Alice Springs in the center of Australia. That is where many Aborigines live. We are different from the other people in Australia because we have brown skin. We are actually the original people of Australia. The white people came here in 1788 and took our land. After that, we learned to live with them. In Aboriginal culture, we do not own land. The land is for everyone. The animals and plants are for everyone but the white people take the land and use it for farms. They cannot understand our ideas about land and its importance for us. Life is not easy for me because I am an Aborigine. University life is also difficult because most universities are in big cities. They are far from our homes in the center of Australia. There are many Aborigines in Alice Springs, but I am the only Aborigine in my class at university so I feel that I'm different. Universities are very expensive. We have to buy many books but we are poor. I am the first Aborigine woman to go to university. I want to be a teacher because there aren't many Aboriginal teachers in our schools. I want to teach my people our history. I do not want Aboriginal children to forget their history. They learn only Australian history at schools but that is different from our history. Aboriginal history is not written in history books. Everybody learns it from their grandparents. They tell stories, and these stories are very important because they explain our history. They tell about the beginning of the world and about the land, trees and animals. They teach us many things about Aboriginal life and help us to understand the difference between right and wrong. I want to learn new things at the university but I also want to learn things from my grandmother, who tells us stories. She never went to school, but she is a very wise woman. She knows many things about Aboriginal culture. She teaches me these things so that I can share them with other Australian students. Then, the white people can better understand us.

12 Natalie Imbruglia Natalie Imbruglia was born in 1975 in a small town two hours from Sydney, Australia. She is the second daughter of a family with four girls. Her father is Italian and her mother is Australian. She took tap dancing and ballet lessons when she was a child. She danced 6 days a week, mainly after school. When she was fifteen, she went to a drama school. She became famous when she started acting in the Australian TV series Neighbours. Two years later, she got bored with it and left. In 1994, she moved to London. She needed to earn money, so she started writing songs. In 1996, she met Mark Fox, creative director for BMG publishing. She showed her work to him and he liked it so much that he contacted Phil Thornally, a former member of the rock band The Cure. Then, they recorded her hit song, "Torn". It was so popular that almost all major radio stations around the world played it again and again. In 1998, she made her first album "Left of the Middle". It was very successful and it brought her many prizes, including MTV Music Video Awards, the Australian Record Industry Awards and MTV Europe Video Music Awards. Now, Natalie lives alone in West Hampstead, London. She still loves acting and she acted in Johnny English together with John Malkovich, but she wants to go on writing and singing her songs for a while. In April 2005, she released her third album. The first single from this album was "Shiver" and it became her longest running single.

13 Celine Dion Celine Dion, one of the biggest international stars in pop music history, was born in Canada in 1968. She is the youngest of the 14 children in the Dion family. She began singing in her parents' piano bar when she was just 5 years old. When she was 12, she recorded one of her first songs " Ce N'etait Qu'un Reve" ("It Was Only a Dream"), with the help of her brother Michel and her mother. Michel sent this song to a manager named Rene Angelil. When he listened to the demo tape, he decided to become her manager. At the beginning, Celine became famous only in Canada and France because all her songs were in French. At the age of 18, Celine saw Michael Jackson performing on TV and told Angelil she wanted to be a star like him. Angelil sent her to an English school to learn English, and also he changed her hair style and her physical appearance. Celine was now ready to be successful in the USA with her new image. Her first international success was the theme song for Disney's "The Beauty and the Beast". The song won both a Grammy and an Academy Award and topped the pop charts. In 1994, she got married to Angelil, who is 26 years older than her. In 1996, she won another Grammy Award and was invited to the opening ceremonies of the Atlanta Olympics. The following year, she sang "My Heart Will Go On", the theme song of the film "Titanic", and was once again number one. In 1999, she announced that her husband had throat cancer, so she had to take a break to spend more time at home. Two years later, she gave birth to her son. Dion returned to the public eye in 2002 with her hit " A New Day Has Come". She is still one of the hardest working stars in show business.

14 Hetty Robinson Hetty Robinson learnt all about money when she was very young. As a child, she read the financial pages of the newspapers to her rich father. Her father died when Hetty was 30 years old and she inherited $1 million. When she herself died, her two children received a fortune of more than $100 million. Hetty made her money on the New York stock exchange. She was a genius. She was named 'the Witch of Wall Street' because she made money quite easily. She was one of the richest women in the world, but she was very mean; she counted every cent and she spent very little. She didn't own a house because she didn't want to pay property taxes. She and her children lived in cheap hotels. She spent almost nothing on clothes, and wore the same black dress every day. She washed it herself, but she only washed the bottom of the dress, where it touched the ground, because she didn't want to spend money on soap. Other people had their own offices, but Hetty used a desk in the bank where she kept her money because it didn't cost anything. She sat in the bank and ate her sandwiches while she bought stocks and shares. If the bank complained, she just moved all her money to another bank. Hetty's family paid the price for her meanness. When she was 33, she married a millionaire, Edward Green, and they had two children. Green, however, lost all his money, so Hetty left him. When her son, Ned, hurt his knee in an accident, Hetty didn't want to pay for a doctor, so she took him to a hospital for poor people. The doctor knew that Hetty was wealthy and asked for money, but Hetty didn't pay any money and took the boy away. His leg didn't get better and two years later doctors removed it. But in the end Ned got his revenge. At the age of 81, Hetty had an argument with a shop assistant about the price of a bottle of milk. She got so angry that she had a heart attack and died. She left half of her money to her son, who spent it all on parties, holidays and expensive jewellery.

15 A New Dowry Item: The Computer Min Huang is a banker in a small city in China. She surprised her new in-laws when she showed them a computer in her dowry. It was there with the traditional items like furniture, dishes and linen. When the family asked about the computer, she explained that she wanted to improve her professional skills. Her office was computerized. "I also hope to connect to the Internet at home to broaden my horizons," she said. When she told her parents that she wanted a computer for her dowry, they didn't hesitate to buy her one. They knew a computer would be important to her and to her new family's future. People who study Chinese marriage customs are very interested in this story. According to those customs, the groom's parents are responsible for the couple's housing. The bride's family supplies the daily necessities. However, the contents of the dowry have changed over time. In the past, when rural people lived in fairly harsh conditions, they usually provided grain and clothing for daughters who would soon be married. This showed their desire to protect them from hunger and cold. In the 1950s, farm equipment and animals became popular items. Parents hoped that their daughters' lives could be improved through hard work. Modern times, however, brought the need for VCRs, stereos and computers. Through these dowry items, parents hope that their daughters will be part of a successful, modern world. Min's parents said, "We want our daughter to be part of a new world. A computer is part of that world." Min completely agrees, and is thankful to have such generous and intelligent parents.

16 Mirrors Mirrors have always been considered as having special powers. The superstition that breaking a mirror is bad luck is very, very old. This belief can be observed in some form in most cultures around the world, but, in fact, the first mirrors could not really be broken because they were made of water. People looked at themselves in lakes, ponds and rivers because they believed that by looking at their reflection in the water they could learn about their future. If the water was calm and the reflection was clear, this was considered a good sign meaning that good things would happen to the person. On the other hand, if the water was rough, i.e. not calm, and the reflection was distorted and hard to see, this was a sign that the future would be bad. In the first century B.C., the Romans used to read water fortunes. You could go to a seer, a person with special powers, and have him or her tell you what your future would be. The seer would ask you to hold a bowl of water and look into it and then he or she would study your reflection and tell you what was going to happen to you. If you dropped the bowl, it meant that you had no future, a very bad sign. Ancient people had the idea that a person's reflection was actually the person's soul and that the soul existed outside the body in the reflection. Therefore, if the mirror broke (or the water bowl was dropped), it meant that the soul would be destroyed and the person would soon die. In many cultures, people believed that it was dangerous for a person to look at his/her own image too long. This was because they believed the soul in the reflected image could pull the life out of the person. Similarly, The Basutos (a Bantu tribe in South Africa) believed that crocodiles could drag a person's reflection under water and kill it. In the sixth century B.C., the Romans changed their ideas about mirror fortunes a little. At this time, they believed that a person's health and fortune changed every seven years. Therefore, if you broke a mirror, it was not quite as bad as before: You would have seven years of bad health and general bad luck, but at least you probably wouldn't die. However, Chinese people believed that a well-placed mirror could protect you from evil. This was because they thought bad spirits would be frightened by their own image in the mirror and would then leave people alone. There is an ancient Chinese saying: "When evil recognizes itself, it destroys itself." Therefore, brass mirrors were often placed in the bedrooms to scare evil spirits. They were supposed to protect people while they were sleeping.

17 Future Cities In The Sea In some coastal countries where there is not enough land for an increasing population, living space can expand into the sea. For example, the land area of Hong Kong is small, but the population is large. Therefore, many of the city's poor are unable to find affordable homes in the city itself. They dwell in boats that are tied close to each other by the shore. Such floating towns have given new ideas to a number of architects from different countries. These architects are working on several futuristic designs for oceanic cities. One of these designs, by Eckhard Schulze-Fielitz, is a huge city called "New Venice." It will be built on floating containers. The idea of floating cities has attracted special attention in Japan, which has an enormous population density. Like Schulze-Fielitz, the Japanese architect Kiyonori Kikutake has also suggested floating containers in his design of a town called "Unabara" (Ocean). Another Japanese architect, Hidezo Kobayashi, has proposed building a city, actually a safer one, in a bay which will extend an existing city from the shore into the ocean. It will use both structures that float and structures that are securely tied to the bottom. Boats will pass over and around this city, and waves and tides will provide its energy. Kobayashi's city will also be a base for taking out mineral deposits that lie on the ocean floor.

18 Going For Gold Gold was probably first found on the ground and used by prehistoric man in tool-making. In ancient times, it was made into plates, cups, vases and vessels of all kinds, and of course, jewelry. The first use of gold as money occurred in Anatolia in 670 BC, but it has always been accepted as money anywhere in the world. Sailors, for example, wore a gold earring. If they were shipwrecked, they could exchange it to get home again. Gold is still given to military pilots for the same reason. People have always been fascinated by gold. How many times have people killed others and how many lives have been lost for it? The gold of the Pharaohs was stolen from their tombs in the Pyramids. The Inca and Aztec empires were destroyed for gold. Later in history, hundreds of men from other civilizations died in the jungles of South America as they searched for the golden city of Eldorado. In 1849, thousands of people left their homes to join the California Gold Rush. Many were killed by Indians and diseases such as cholera, tuberculosis, chicken pox and the Black Death. Pure gold is rare both in nature and in manufacturing. It is usually mixed with other metals. The proportion of gold is shown in carats. If the carat number is high, this means there is more gold but fewer other metals in it. Pure gold is twenty four carat and the cheapest is nine carat. The word carat comes from the Greek word, keration, which means a carob seed. These seeds were used to weigh gold and diamonds. Most gold today is found in South Africa (612 tons a year) and North America (459 tons a year). About 83% of it is used for jewelry. Of the rest, about 9% is used by industry, about 6% is used for coins and 2% is made into gold teeth. Gold is usually found in very small pieces or nuggets. The largest nugget, the Holtermann Nugget, was found in 1872 in Australia. Its weight was 214 kilograms. The largest reserves of gold are held in the USA in the Federal Reserve Bank and at Fort Knox. The second biggest stores are held by the Bank of England and the Bank of France. Not all of this gold belongs to the governments of these countries. A lot of it is owned by companies, other governments and individuals. When gold is bought and sold, it isn't usually moved. Only the names on a piece of paper are changed. The gold itself stays in the bank. Today, gold is still the most important and valuable metal. And man has used it in many different fields. For example, in the 1920s doctors in France started using gold to treat a disease called rheumatoid arthritis. In the 1960s, scientists used gold-coated mirrors to maximize infrared reflection. In the 1980s, car manufacturers used gold for the metal parts of airbags.

19 The Beetle: A Legend On Wheels One of Hitler's dreams was to increase the number of car owners in Germany, so he employed Dr. Ferdinand Porsche, the well-known constructor, to design an affordable and reliable car for the people. Hider and Porsche often had arguments, but Porsche was afraid of him, so he stayed in the project and continued his work in the Wolfsburg car factory. In 1938, the factory produced the first cheap car "for the people". It included all the characteristics that Hitler ordered. The engine was at the back of the car and it had quite a specific shape: it was very round and it looked like an insect. That was the reason why it was called "Beetle". During World War II, the Germans used the Wolfsburg car factory to make all-terrain cars — Kubelwagens — and airplanes for the army. However, as soon as the war ended, Beetle production started again and the Beetle immediately became even more popular than Ford's Model 'T'. The great success started with the import of Beetles to Holland in 1947. By 1972, the total number of Beetle cars produced had increased to over 15,000,000. Then sales started to go down because the Beetle was still a 1940s design, although there were some small changes in the engine. In the end, the Beetle lost the war against technology. In 1974, the new Golf model replaced the Beetle in the Wolfsburg car factory. The car designers decided to make a car completely different from their original Beetle model. In 1975, Volkswagen introduced this new Golf in the United States where it was called the 'Rabbit'. Over the years, the Germans produced many models of Volkswagens, using the Beetle and Golf as a starting point and including many other concepts and standards. These were produced in Emden, Osnabruck, Wolfsburg and other German cities. Today many people say that Volkswagens are among the most comfortable and powerful cars in Europe. The production of the Beetle in Germany ended in 1978. However, in the early 1980s, there were still millions of Beetles on the road. People formed Beetle Clubs all around the world thinking that it would never disappear. Around 1990, there were fewer Beetles on the road. Today, it is almost impossible to see the Beetle in the streets, but the owners of the few remaining Beetle models still try to keep their small cars in the best possible condition. They enjoy driving the Beetle because it has a history behind it. This makes it very special for them.

20 An Unusual Style Leonardo da Vinci was one of the most interesting characters of the Italian Renaissance. He wrote in Italian using a special kind of shorthand that he invented himself. People who study his notebooks have long been puzzled by something else, however. He usually used "mirror writing," starting at the right side of the page and moving to the left. Not only did Leonardo write in mirror-image script from right to left, but he used strange spellings and abbreviations, and his notes were not arranged in any logical order. He only wrote in the normal direction when he was writing something intended for other people. People who were contemporaries of Leonardo left records saying that they saw him write and paint left- handed. He also made sketches showing his own left hand at work. Being left-handed was highly unusual in Leonardo's time. Because people were superstitious, children who naturally started using their left hands to write and draw were forced to use their right hands. No one knows why Leonardo used mirror writing, though several possibilities have been suggested. Some believe that he was trying to make it harder for people to read his notes and steal his ideas. Others think that he was hiding his scientific ideas from the powerful Roman Catholic Church, whose teachings sometimes disagreed with what Leonardo observed. Another possibility is that writing from left to right was messy because the ink just put down would spread as his hand moved across it; therefore, Leonardo chose to write in reverse because it prevented smudging. Over 4,000 pages of Leonardo's scientific and technical observations in his handwritten manuscripts have survived. It seems that Leonardo planned to publish them as a great encyclopedia of knowledge, but like many of his projects, this one was never finished. After his death, his notes were scattered among libraries and collections all over Europe. While Leonardo's technical treatises on painting were published as early as 1651, most of his scientific work remained unknown until the 19th century.

21 Color Therapy Color therapy is the use of color in a variety of ways to promote health and healing. Used to treat both physical and emotional problems, color therapy may involve exposure to colored lights, massages using color-saturated oils, visualizing colors, even wearing colored clothing and eating colored foods. Color has played a role in healing for centuries. In ancient Egypt, patients were treated in rooms specifically designed to break up the sun's rays into separate colors. In Iraq, people also made regular pilgrimages to the Hanging Gardens of Babylon to take advantage of the healing colors of the exotic plants and flowers found there. In India, practitioners of Ayurveda taught that specific colors corresponded with the seven chakras, each of which is an energy center that represents organs, emotions, or aspects of the spirit. However, modern-day color theory was born in the late 17th century when Sir Isaac Newton did his prism experiments and showed that light is a mixture of colors from the visible spectrum. Although doctors used color to treat everything from psychological problems to smallpox over the next hundred years, interest in colors' effects on healing didn't really become widespread until 1878, when Dr. Edwin Babbitt published his book Principles of Light and Color. In his book, he explained his work in chromatotherapy, that is, healing with colored lights, and suggested it as a treatment for a variety of ailments, including burns, nervous excitability, and cold in the extremities. Probably the most extensive and detailed work on colored light therapy, however, was done by Dr. Dinshah P. Ghadiali who had studied Babbitt's work. In 1920, he introduced a system of colored lights, which he named "Spectro-Chrome" lamps. These were used as a treatment for such diseases as diabetes, tuberculosis, and chronic gonorrhea. Although they were considered logical and effective by the doctors who succeeded with them, many others regarded them as ridiculous. Still, this work continues to inspire many color therapists today. In 1947, Swiss psychologist Dr. Max Lüscher introduced the Lüscher Color Test, a form of color therapy still widely used by many psychologists. The test involves choosing 43 colors from a total of 73 possibilities. By observing the colors a person chooses or rejects, and the therapist can learn about his psychological state. For example, if a person selects darker colors, it suggests a need for rest and stress reduction. At about the same time, Russian researcher S.V. Krakov was conducting a series of experiments to show how color can affect the nervous system. He observed that red light stimulated the adrenal glands; therefore, it raised blood pressure and pulse rate. On the other hand, blue and white

light had a calming effect. Although there are still no studies supporting Krakov's work, today, many practitioners recommend color therapy for stress. In recent years, interest in color therapy has grown as studies have shown the positive effects on different forms of depression. Mainstream researchers are looking into its use for a variety of other illnesses as well, from sleep disorders to hormonal problems. In addition, over the past decade, AuraSoma, an Eastern-influenced therapy that uses colored bottles of essential oils, has gained popularity. Moreover, Esogetic Colorpuncture Therapy, which focuses colored light on acupuncture points, is being studied as a treatment for a variety of health problems, including migraines, bronchitis, and uterine fibroids.

22 Cities In The Sea As the earth's human population grows rapidly, satisfying basic human needs becomes more difficult. Living space and shelter are among our primary requirements. Some parts of the world are simply running out of room for their increasing populations, and people are beginning to look to the sea for additional space. Other basic requirements of human life are food and natural resources. It is no longer enough to farm and mine the lands of the earth for foodstuffs and minerals. Consequently, we have begun to obtain some of the vast mineral and agricultural wealth of the oceans. In recent years, mining and drilling in the sea have added to our stores of oil and gas. In addition, deep sea exploration and mining will soon give access to the rare minerals on the ocean floor. There are, therefore, two reasons why it may become necessary to learn to live in the sea. First, we might need some of its immense area for living space. Second, we might need to make use of the resources that lie in its depths. There are already a number of proposals and experiments that may help to achieve these goals. In the early 1970s, the Japanese began the construction of Aquapolis on the main Japanese island of Honshu. It is a prototype of futuristic floating cities designed to run on wind, and tidal energy. It uses a biological waste-water system, which disposes of sewage by means of a species of green algae known as chlorella, rather than by chemical means. The time may come when floating cities such as Aquapolis exist not only as permanent extensions of land-based habitats but also as free-floating platforms. These would drift from continent to continent across the deep oceans. Such cities would permit deep sea miners and their families to live near their work places on the ocean floor, but at the same time, miners working on the ocean bottom would face a set of problems. One such problem would be the enormous pressure exerted by the ocean at great depths. Another would be the lack of easy access to air. To study these difficulties, and to test human adaptability to life beneath the sea, scientists have been carrying out several experiments within the last century. The first of these was the Conshelf I Habitat. In 1962, a team, directed by Jacques-Yves Cousteau, remained at a depth of ten meters in the Mediterranean Sea for seven days. The results of this experiment led to the building of the Conshelf II Habitat, where five oceanauts lived successfully at eleven meters. Data from these experiments made possible the construction of Conshelf III in 1964, when two men lived at a depth of 132 meters for forty-eight hours. In the same year The United States Navy tested Sealab I, in which four men lived at a depth of nearly 60 meters for nine days. They found the environment comfortable at a temperature of twenty-nine degrees Celsius and a relative humidity of 72 percent. From these experiments, scientists learned that daily swimming at these depths caused oceanauts to show symptoms of stress.

In spite of minor drawbacks, those experiments have proved the possibility of living in the sea. Their success has encouraged the architect Warren Chalk to design an entire underwater city, which would make maximum use of space, and would enable entire human populations to live safely and comfortably far beneath the sea for long periods. Obviously, deep sea living has its physical dangers and psychological drawbacks like being in isolation. Nevertheless, due to the necessity of meeting our primary requirements, we may build underwater cities which may even be connected by advanced systems of communication and transportation. Perhaps our children will live in what futurist Alvin Toffler calls "the New Atlantis."

23 IQ or EQ? "If you are lucky, your looks, the right contacts, and a presentable set of qualifications might get you on the first step of the career ladder. However, it's some other qualities that will lift you to the top. While your IQ (intelligence quotient) might get you hired, it's your EQ (emotional quotient) that will get you promoted, says Daniel Goleman in his book Emotional Intelligence, which became a best seller in just two weeks after being published in 1999. Like IQ, EQ claims to measure intelligence, but EQ cannot be calculated in numbers. It is a complex mixture of the qualities that make us who we are. Where IQ claims to measure pure brainpower, EQ embraces all-important factors such as sociability, optimism and empathy, qualities that gained significance in the 1990s-working environment. Co-operation, communication, and the ability to listen to others and to speak one's mind are all important aspects of social interaction in modern business, and the most productive workers tend to be those who are good at motivating themselves and working with m a team — not necessarily the ones who are 'the most intelligent on paper'. People with high IQs may be able to solve the most complicated mathematical formula or scribble symphonies on the back of a cornflakes packet, but they usually tend to be at a bit of a loss when it comes to understanding how to behave in company — not to mention being rather boring to have at parties. According to Geraldine Bown, Chief Executive of the Domino Group, a human resource management consultancy, one of the most exciting findings to come out of the EQ discovery is the fact that high EQ qualities are those traditionally associated with a feminine or "soft" approach to management. "Now that training gurus are talking about how people need to get in touch with their intuitive selves, they are sending senior male managers on courses to learn how to understand their own feelings," she says. "And, all the time, they have organisations full of women already well in touch with theirs! It's just these qualities that will be advantageous in the future". Beverly Alimo, Senior Lecturer in Organisational Psychology at the Nuffield Institute for Health has researched leadership qualities in men and women. Her work shows that women are more likely than men to share power and try to enhance other people's self-confidence. What is more, this EQdriven style of leadership is so much better suited to modern organisations. "We know women are more likely to exhibit a real understanding of human behaviour," she says. "They think through the consequences and the effect on others before they act." According to Dr. Alexis Hallam, Occupational Consultant Psychologist at Career Analysts, the main aspect of emotional intelligence is self-awareness. Thinking about how you feel improves your

ability to work well. Really understanding how you feel and analyzing emotions about your work could also help you make better decisions about your career. "Most people go for extra qualifications to break through career barriers," she says. "What they don't understand is that in order to move up through organizations, more than extra qualifications and pure brain power is needed." Therefore, next time you feel inadequate because you know you'll never be a rocket scientist, remind yourself that you may, in fact, be cleverer than you think.

24 Bgm: More Than It Seems Elevator or background music (BGM), which is often referred to as "Muzak," dominates our world. It is easier to think of places that lack BGM than to list all those where it is found. Most establishments where we purchase goods, services, food, or drink have BGM. Many workplaces like factories or offices have it, too. BGM is currently being marketed for the home in digital stereo as well. BGM is not a modern invention. It has been in demand since people started recording music. Moreover, contrary to common belief, it is not composed only by second-rate composers but also by world-famous composers: Handel, Mozart, Beethoven, and other masters produced music that was intended for "background" listening, often for dinner parties of the aristocracy. One major difference between former times and recent times is that today BGM is more affordable and available. The widespread and increasing presence of commercial BGM shows that BGM is very effective in changing human behavior. For example, one study of the effectiveness of music in supermarkets showed that the use of slow music increased sales. Shoppers stayed in the store longer and purchased more. The average gain of each supermarket was between $12,000 and $16,000, an increase of nearly 40%. Why might the use of music be so effective throughout society? One very strong possibility is the powerful influence of music on the communication and creation of emotions and moods. Moreover, music may provide a form of non-verbal communication whose message cannot be expressed in words. Thus, music can rapidly and powerfully set moods in a way that cannot be achieved by other means. Moreover, sound can spread through a place and reach all potential audiences simultaneously. This is something achieved by visual images only in special circumstances, as in a cinema. However, here too, BGM has an important role. If you think for a moment, you will probably realize that without music, the impact of a movie would be dramatically reduced. Moreover, researchers have shown that filmed events can be remembered significantly better when they are accompanied by music, particularly music that fits the mood of the visual images. BGM is also effective in altering and directing people's opinions. For example, market researchers, who advise advertising agencies and their clients, make a clear distinction between purchasing situations: some require the use of high cognitive processes while others require low cognitive processes but with high emotional involvement. What do jewelry, sportswear, cosmetics, and beer have in common? They are rated as fitting the latter category, i.e., not much thought but plenty of feelings. Music has been shown to be quite effective in increasing the purchase of these products. On

the other hand, music seems to be much less effective when one is trying to sell a PC, a camera, or insurance, which are "high cognitive" items. The fact that BGM has strong effects on behavior by communicating moods and emotions is supported by studies like those proving the impact of music on the purchase of consumer goods. Thus, we should maintain an awareness of the powerful effects of music on human emotions.

25 Ancient Artifacts And Ancient Air Archeologists made an exciting discovery in Egypt in 1954. During an excavation 1 near the base of the Great Pyramid, they uncovered an ancient crypt, or an underground room. They believed that this discovery would help us understand Egypt's past. They also hoped that it would give us important information about the future. This crypt was a tomb (i.e. a burial place) for a dead Egyptian king. Historians believed that the Egyptians buried their kings with two boats: one to carry the body and the other to carry the soul. This was one of their religious customs about death. Therefore, the archeologists expected to find two boats inside the crypt. As they opened the crypt, they smelled the scent of wood. The ancient Egyptians had closed the room so effectively that the aroma of the cedar wood was still there. Inside the crypt, archeologists found a 4,600-year-old boat that was in almost perfect condition. In addition, they found another crypt next to the first one. Archeologists and historians believed that this crypt contained the second boat. If so, they would have better information about the past. They would be sure about the religious custom of burying kings with two boats. However, this was not the only information they hoped to find. They wondered if the air in the two rooms contained something special that helped to preserve the wood from changing. Researchers hoped to find some clues about the future by carefully examining the air in the second crypt. They thought that this information could help them in the preservation of ancient artifacts (objects) in museums throughout the world. When the archeologists opened the first crypt, all the old air escaped. They wanted to recover the air in the second crypt to compare it with the present air, and then examine the differences, especially differences in the level of carbon dioxide. Careful planning would be necessary in order to open the second crypt and save the air. In fact, it took years to plan the excavation and to design and make the equipment necessary to open the second crypt and collect the air inside it. Finally, in October 1986, an international team of scientists and archeologists, using special equipment, opened a hole in the roof of the crypt. They sealed the hole they had made. That is, they carefully closed it so as to prevent the air inside the second crypt from escaping. Then, they took an air sample. The air inside was the same as the one outside. The scientists were very disappointed but they continued working to see what was inside the crypt. Attached at the end of a long rope, a light and a camera were lowered through the small hole, and the archeologists looked at the inside of the room on a television monitor. The second boat was really there! 1

Excavation: reoving eart that is covering very old objects buried in the ground.

After the scientists and archeologists took samples of the air inside and photographed it completely, they closed up the hole in the roof and left the crypt as they had found it. Although they were disappointed about their findings of the air inside the crypt, they were able to prove the Egyptian custom of burying kings with two boats. More importantly, they practiced a new, nondestructive approach to archeology: investigate an ancient location, photograph it and leave it untouched. After examining the photographs they had taken, scientists and archeologists realized that the second boat was not as well preserved as the first one. They thought that this might be due to the construction of the museum after the first excavation. After archeologists had opened the first crypt years ago and removed the boat, the Egyptian government had built a museum on the site of the first boat. During the construction of the museum, the vibrations from the heavy machinery had probably damaged the second crypt and destroyed the seal, so the second boat was not in perfect condition. The investigation of the second chamber taught archeologists a valuable lesson. New excavations will not only use modern technology but also follow the idea of preserving the entire location for future studies.

26 Just As Good As The Original? In 1979, the painter Tom Keating was arrested and charged with forgery. He was accused of faking and selling a painting by Samuel Palmer, an early nineteenth-century British artist. Everyone in the art world was shocked when Keating admitted faking more than 2,000 paintings by various artists over a period of 20 years. He couldn't remember the exact number. Nor could he remember whom he had sold them to, which meant that many of his fakes could not be traced. As a young man, Keating had been employed by art dealers to make copies of paintings by well-known artists whose original paintings sold for high prices. He was paid very little for this work and assumed that his paintings were also being sold for low prices because they were copies. He then discovered by chance that the dealers who employed him were selling his copies as originals for hundreds of times the price that they paid him. This experience made him very angry, and he decided to teach them a lesson in his own way. He set about producing large numbers of fakes by over 100 artists as he was sure that most art dealers and art critics could not tell the difference between the genuine and the fake. Keating had a rather casual attitude to his paintings. He often gave them away or sold them cheaply. Many unsuspecting people thought they had picked up a bargain from him. In fact, he had not made himself rich, but he took great delight in fooling so-called experts. What he wrote on the canvas also reflected his sense of humor. Before starting to paint, he would write the word 'FAKE' or 'KEATING' or sometimes a vulgar word. The word would be covered by paint but would show up if anyone took the trouble to X-ray the paintings. Having X-rayed paintings, some famous museums discreetly removed Keatings from their walls. Although he faked paintings by many artists, Keating specialized in the works of Samuel Palmer. Unfortunately, Palmer's genuine output was quite small, much less than Keatings, and soon the number of 'previously unknown' or 'just discovered' Palmers coming on to the market began to arouse suspicion. He admitted in court that he was rather ashamed of the particular painting he had been charged with faking: it wasn't up to his usual standard. He admitted everything and took great delight in showing the greed of the dealers. They had once exploited him and cheated their customers. He did not go to prison, as the charges against him were dropped because of his poor health. After the trial, which had received a lot of publicity, he became very well-known and appeared 6n television. He actually painted a Samuel Palmer in about half an hour in the television studio, with the whole process being filmed. Later, he had his own television series in which he taught his painting techniques. There is no doubt that Keating had remarkable talent, and at the end of his life he received many orders for his own work. Nowadays, even his fakes sell for quite high prices.

27 The Healing Power Of Music Marianne Strebely, severely injured in a car accident, lay in the operating room of St. Luke's Hospital in Cleveland, awaiting anesthesia. Surrounded by a surgical team, Strebely was hooked up to a computer that monitored her heart rate and brain waves. She was also hooked up, by earphones, to a tape recorder playing Vivaldi's The Four Seasons. During the operation, the surgical team listened to Mozart and Brahms from another tape recorder. "Music reduces staff tension in the operating room," says Dr. Clyde L. Nash, Jr., Strebely's surgeon, "and also relaxes the patient." Nash is one of many physicians around the country who have found that music, used with conventional therapies, can heal the sick. Dr. Mathew H. M. Lee, acting director of the Rusk Rehabilitation Institute at New York University Medical Center, adds, "We've seen confirmation of the benefits of music in helping to avoid serious complications during illness, enhancing patients' well-being, and shortening hospital stays." How does music help? Some studies show it can regulate blood pressure and respiration rates, thus lessening physiological responses to stress. Other studies suggest music may increase production of endorphins (natural pain relievers) and S-lgA (salivary immunoglobulin A). S-lgA speeds healing, reduces the danger of infection, and controls heart rate. Music therapy is proving especially effective in three key medical areas: Pain, anxiety, and depression: "When I had my first baby," ,says Susan Koletsky of Shaker Heights, Ohio, "I was in difficult labor for two days. The second time around, I wanted to avoid the pain." Relaxing jazz calmed her in the delivery room; Bach and Beethoven paced her during contractions; finally, the closing movement of Brahms's Symphony No.l energized her while she was giving birth. "The music produced a much easier experience," she claims. The amazing power of music as a way of therapy can also be observed on cancer patients during their bout with the illness. These people often brood in their hospital rooms, refusing to talk with doctors and nurses. "The music therapy helps them to have a positive outlook. This makes it easier for them to communicate and encourages them to cooperate more in their treatment," says Dr. Nathan A. Berger, director of the Ireland Cancer Center at University Hospitals of Cleveland. Mental, emotional, and physical handicaps: The Ivymount School in Rockville, Illinois, helps youngsters with developmental problems ranging from emotional disturbances to mental retardation, autism, and learning disabilities. Ruthlee Adler, a music therapist for more than 20 years, uses songs and dance to help the children learn and cope. "While the seriously handicapped may ignore other kinds of stimulation, they respond to music," she says.

Neurological disorders: Dr. Oliver Sacks, whose work with sleeping-sickness victims led to the book and movie Awakenings, reports that patients with neurological disorders who cannot talk or move are often able to sing, and sometimes even dance, to music. "The power of music is remarkable in such people," Sacks observes. In a group session for elderly patients at Beth Abraham Hospital in New York City, a 70-year-old stroke victim sat by himself, never speaking. One day, when therapist Connie Tomaino played an old Jewish folk song on her accordion, the man hummed. Tomaino played the tune regularly after that. Finally, the man sang some of the words. "Before you knew it," says Tomaino, "he was talking." Few people understand the therapeutic powers of music better than Cleveland music therapist Deforia Lane. Ten years ago, during her own struggle with cancer, singing helped her relax and take her mind off the disease. Since then, she has used that experience to help others. "Music is not magic," says the 44-year-old therapist with the warm smile and rich soprano voice. "But in a hospital or at home, for young people or older ones, it can be a potent medicine that helps us all." Of course, music's therapeutic benefits aren't only confined to those who are ill. Apart from the simple enjoyment that music provides, we should see how much it could help us in our daily lives. It is obvious that, during the day, music gives our minds a break as it lets us focus on something else for a few minutes and helps us to cope with daily problems more effectively. To gain the full benefit of music, all we have to do is to work it into our daily schedule.

CULTURE

28 Kwanzaa Kwanzaa is a modern festival celebrated by African Americans. It comes from traditional African agricultural festivals. In fact, the name 'Kwanzaa' comes from the Swahili word for 'first fruit'. This modern festival started in California in the United States in the 1960s because some black people wanted to celebrate their original history and culture in their new country. Today, black people all over the country take part in this special event as they want their children to value their African-American history. Kwanzaa is not a religious festival, but a festival that celebrates several important ideas or principles—principles like unity, cooperation and creativity. The festival lasts for seven days starting on 26 December. People light candles, give gifts, and talk about one special principle each day. On each night there is a dance, and on the final night there is a big feast. That is, people have a large special meal all together. As Kwanzaa becomes popular, it is also becoming more commercialized, a lot of people are making money from this festival. There are now Kwanzaa cards, books on Kwanzaa, Kwanzaa poetry and recipes. Parents are buying more expensive gifts for their children. Now there is also "Nia Umoja', a kind old man, rather like Father Christmas. It was first thought of by the organizers in the late 1980s to attract children to the festival. The festival may at first seem to be held just for fun, but actually the principle of cooperation helps the serious side of Kwanzaa because people collect food and clothes for the poor. Kwanzaa is an interesting balance of African and modern American influences.

29 Picking Apples—A New England Tradition Throughout New England, people know that fall has arrived when the Macintosh apples begin to turn red in the orchards in early September. After the "mac" apples come the Cordands, the Empires, the McCoons, and, finally, the Golden Delicious. All through September and October, the aroma of ripe, fully grown, apples fills the air on sunny days—an invitation to come picking. A day of apple picking is, in fact, a popular way to spend a fall day in New England. From Connecticut to Maine, it is generally possible to find an orchard within an hour's drive, and the trip is well worth the time. Not only will it provide you with plenty of the freshest apples to be found, but it will also give you a chance to take in some sunshine and autumn scenery and get some exercise. The picking is usually best done by adults. Children should not climb up into trees and risk hurting themselves and damaging the trees—younger members of the family can have fun just romping around the orchard. The picking may not take long—two hours at most—but many of the orchard owners now offer other kinds of entertainment. At some orchards, you can go for pony rides or ride on a hay-filled wagon. You may be able to watch a horse-show or visit the cows or sheep in the pasture. You may also decide to take a hike and have a picnic along a country lane. Some orchards have set up refreshment stands in their barns where you can taste local products, such as apple cider and homemade baked goods. A few hints: 1. Call before you go. Check the local newspaper for the names and locations of orchards which offer pick-your-own apples. Then phone to find out their hours, since they may change from one orchard to another. You should also ask about the rules regarding bags arid containers. Most orchards provide bags, but a few do not, and some will allow only certain types of containers: 2. Check in when you arrive. Before you start picking, you should check with the orchard owner about which varieties are ripe in that period, and which parts of the orchard are open for picking. Respect the owner's privacy, and do not go where you are not allowed! 3. Pick carefully. When you pick the apples, treat them gently. Some orchard owners advise pickers to treat the apples as though they were eggs. If they bruise, they will spoil more quickly. The

technique for picking is simple: hold the apple firmly but not too tightly and twist it off the branch, taking care to leave the stem attached, since removal of the stem will also cause rot. 4. Don't waste apples. Be careful to pick only the apples you need. You may be tempted and pick too many of the delicious looking fruit since you are attracted to it, and then find that the apples go bad before you can eat them. Since the apple season lasts for almost two months, you can always return for another load of apples later. 5. Keep what you pick! Once you take an apple off the tree, you must keep it. It's not fair to the orchard owner to leave apples on the ground where they will quickly spoil. 6. Store your apples properly. Put your apples in the refrigerator as soon as you get home. Studies by the Vermont Department of Agriculture have shown that apples last seven times longer when kept under refrigeration. If you do pick too many apples to eat in a week or two, you could try freezing them to use later in pies and cakes. Simply peel, core, and slice them, and then put them in airtight plastic bags. They may be kept in the freezer for up to a year.

30 Men in skirts In Europe men do not wear skirts, but the Scottish national costume for men is a kind of skirt. It is called a 'kilt.' The Scottish are proud of their country and its history, and they feel that the kilt is part of their history. That is why a lot of men still wear kilts at traditional dances and on national holidays. They believe they are wearing the same clothes that Scottish men always wore in the past. In the early days, Scottish men wore a kind of long shirt that went below their knees. They wore long socks and a big wool blanket around their shoulders. These clothes were warm and comfortable for working outside on a farm, but they were not so good when men started working in factories in the 1730s, so a factory owner changed the blanket into a skirt: the kilt. That was the first kilt. In the late 1700s, Scottish soldiers in the British Army began to wear kilts. One reason for this was national feeling: The Scottish soldiers wanted to look different from the English soldiers. They fought hard and became famous and in the early 1800s, men all around Scotland began to wear kilts. The first kilts had colorful stripes going up and down and across. In Scotland, this pattern is called a 'tartan.' Later, the cloth with this pattern was also called tartan. The pattern of all the kilts was the same, but they had different colors which were important to Scottish families. By the early 1800s, most Scottish families had special colors for their kilts and the men always wore these colors on their kilts.

31 Rituals Of Marriage In American Culture In the US, before a young couple gets married, there are two social rituals which are usually performed before the day of the wedding. For young women, it is the bridal shower and for her prospective husband, it is the stag party. The bridal shower is the more conservative of the two rituals, with the future bride as the centre of attention. It is customarily organized by her sister or best friend and attended-only by women, usually family and friends. It is usually organized as a surprise party, and the bride doesn't know its time and location until the very last minute. Everyone brings along a gift which will be useful in setting up a home. In recent years, however, it has become an acceptable custom to give a monetary gift sealed in an envelope. For the future husband, the stag party may contain more excitement and fewer gifts. This will be his last chance to have an all-night party in town with his close friends. Only men are invited to this party, and rightly so, since some of the pleasures of the evening may not be appropriate for a proper woman's taste. In most cases, however, it may be nothing more than a night of bar-hopping and talking about the good times shared with friends in the past. In addition to bridal showers and stag parties, there are other rituals and traditions concerning marriage in America. For example, the groom must never see his bride in her wedding dress before the ceremony. In some cases, they must not even speak or meet with one another the day before the wedding. Rice throwing at a wedding is also a popular tradition because rice is an ancient symbol of prosperity. Another reason may be the very ancient superstition that at the wedding there are evil spirits which are believed to be flying about the couple. Throwing rice at them could keep these evil spirits busily eating and away from the groom, of whom they are jealous.

32 Aborigines: The Native Australians The Australian Aborigines came to Australia from Indonesia 50,000 years ago. Scientists think that at one time there was a land bridge between Australia and Asia. They believe that Aborigines traveled south over this bridge. Then there were changes in the Earth and the land between Australia and Asia became islands. Australia is a difficult land to live in. It has no river systems and it does not rain very much. But the Aborigines learned to live in the desert. They hunted animals and insects for food. In the cold areas, they wore warm clothes made from kangaroo skins. They usually slept outside by a fire with their dogs nearby. Aborigines were nomads: they went from one place to another. They did not think they owned the land, but they taught their children that they belonged to the land. The Aborigines didn't have a written language. Instead, they had an oral tradition. There were 600 groups, and each spoke its own language. There were 300,000 Aborigines when white people arrived in Australia. The 'new' Australians began to build and live on tribal lands, and the number of Aboriginal people fell greatly. Today, most Aborigines live in cities and towns or in isolated places.

33 The Shakers "Shake it up baby. Twist and shout," was sung by Beatles, but it was practised almost two hundred years earlier by a religious group called "The Unified Society of Believers." This religious group, led by Ann Lee, came to America from Manchester, England, in 1774 looking for a place to freely practise their religious belief. Eventually, they became known as "The Shakers" because the believers worshipped by singing, dancing and whirling around. The Shakers were a peaceful community that welcomed people of all races. They were against war and lived in their own villages separate from the rest of society. They lived communally, that is, sharing their property and working for the common good. The qualities they admired were kindness, generosity, modesty, purity, cleanliness, and love for humanity. Their villages of plain white houses were very neat. Even the roads were swept clean. The Shakers are probably best known for their celibacy2 and hard work. Single men and women did not marry. Married couples who joined the Shaker community had to live in separate houses. In the Shaker community, males and females lived and worked separately as Brothers and Sisters. They never shook hands or touched each other in any way. When conversation between a man and a woman was necessary, it was done in the company of others. Males and females sat opposite each other when they came together once a day for conversation and singing. Even when they danced and whirled around during worship, men and women always kept their distance. As might be expected, the Shaker style of dressing was modest, simple and plain, and their clothes were dark in colour. The women combed their hair back under a cap and wore long dresses with a cloth that covered the chest. Men wore dark pants and simple coats. It was extremely unusual to see these celibate people wearing bright or attractive clothing. "Put your hands to work and your hearts to God," said Ann Lee to her followers. The Shakers took this seriously and worked very hard. In order to be self-sufficient, the Shakers grew their own food, wove their own cloth and made their own tools, utensils and handicrafts. They made chairs, buttons, tubs, baskets, smoking pipes, pens, brooms, brushes, hats, shoes and hand-woven coats. Although simple and plain, these were of the highest quality.

2

celibacy: having no sex, usually because of religious beliefs

Not only were the Shakers industrious, but they were creative and inventive as well. Unlike some other religious groups, the Shakers liked technology and labour saving devices. Their long list of inventions and improvements includes such items as the first garden seeds packaged in paper and machines such as a revolving oven and a wood-burning stove. Although it may seem that the Shaker life was all rules, work and worship, it was not without joy. They spent pleasant hours picking fruit, walking in the woods, going for carriage rides, and laughing together — in separate groups, of course. Over the years, the original Shaker community in New York expanded to twenty-four scattered communities among eight states in the eastern US. Many people were attracted to their peaceful ways and clean crime-free villages. Eventually, the Shakers paid the price for their celibacy: they didn't have any children to carry on their traditions and beliefs, and their numbers became fewer. Today, their villages are museums and their handicrafts are items for collectors.

34 Visiting Japan Visiting Japan can be a very interesting experience. Japan is an unusual mixture of the traditional and ultra-modern. This can be confusing for the visitor because, although it looks quite Western, Japan is still in many ways very Oriental. For example, whenever you go into a house, you must take off your shoes. Sometimes your host will provide you with slippers. If he doesn't, you walk round in your socks. A visitor should also expect, in more traditional houses, hotels, and restaurants, to eat kneeling down on the floor on a cushion in front of a low table. It's a good idea to get used to eating with chopsticks, but, if you can't manage, ask for a knife and fork. The Japanese are extremely polite and hospitable: you can nearly always find someone who speaks English ready to help you. If you are planning to go to Japan, you should consider the weather. Japan has four distinct seasons. In summer, the country is very hot and humid, so anyone planning a trip then ought to take light, comfortable clothes with them. Winter in Japan is cold, but it's not too bad. If you like skiing, especially, going there in January and February is a good idea. Most people agree that the best time to travel in Japan is early-April or late-October. The temperatures are mild, and there is not too much rain at that time. The majority of tourists go to Tokyo, but you ought not to miss the chance of visiting the old capital cities of Kyoto and Nara. From Tokyo you can get to Kyoto in three hours on the 'Shinkansen' super-express. If you are driving, it is important to remember that in Japan you have to drive on the left-hand side of the road. To get round the sights, you can hire a bicycle for 250 yen an hour. For a change from Western-style hotels, you ought to try one of the traditional inns, 'Ryokan.' Instead of a bed, you'll sleep on the floor on a 'futon' mattress and cover spread over the 'tatami' floor mat. To relax at the end of a hard day's touring, you should enjoy a long soak in the 'ofuro'—the traditional Japanese hot bath before trying a delicious Japanese meal.

35 Japanese Culture Japan is an unusual mixture of traditional and ultra-modern. Although it looks quite western, it is still oriental in many ways. Lifestyle A lot of Japanese households consist of both one or more traditional Japanese style rooms with tatami floors and modern rooms that usually have wooden floors. Tatami mats on the floors are made of straw and measure roughly 180 cm x 90 cm. You should always take off your slippers and step on tatami mats only in socks or barefoot in order to protect them from damage. In traditional homes, people sleep on the floor on a "futon" mattress which is laid on the floor only during the night and kept in a closet during the daytime so the bedroom can then also function as a living or dining room. To relax at the end of a hard day, they enjoy a long soak bath in the "ofuro"-the traditional Japanese hot bath, which is usually next to the kitchen. Food and Eating In Japan, some restaurants and private houses have Japanese style tables and cushions on the floor. In a traditional Japanese house, a visitor should also expect to eat on the floor on a cushion in front of a low table. The Japanese usually eat with chopsticks but they have knives and forks for visitors. The Japanese say that food must be tasted with the eyes before it is tasted with the mouth. The Japanese cuisine offers a great variety of dishes and regional specialties such as rice dishes, seafood dishes, noodle dishes and soy bean dishes. Rice dishes have until recently been the most important food in the Japanese cuisine. Despite changes in eating patterns over the last decades and slowly decreasing rice consumption in recent years, rice remains one of the most important ingredients in Japan today, and can be found in numerous dishes. Sushi is the most famous Japanese dish outside of Japan, and one of the most popular dishes among the Japanese themselves who usually enjoy sushi on special occasions. The Japanese have a tea ceremony called Sado. It is a ritual way of preparing and drinking tea. The custom has been strongly influenced by Zen Buddhism. Nowadays, the tea ceremony is a relatively popular kind of hobby. Many Japanese, who are interested in their own culture, take tea ceremony lessons with a teacher. Tea ceremonies are held in traditional Japanese rooms in cultural community centers or private houses. Traditional Japanese dresses Kimonos are traditional Japanese clothing. Kimonos are made of silk and are usually very expensive. Nowadays, they are worn at formal or traditional occasions, such as funerals, weddings or

tea ceremonies. Kimonos can still sometimes be seen in daily life. Kimonos differ in style and color depending on the occasion on which they are worn and the age and marital status of the person wearing them. To put on a kimono needs some practice. Especially tying the belt (obi) alone is difficult, so many people require assistance. Wearing a kimono properly includes a proper hair style, traditional shoes, socks, and a small handbag for women.

36 Romanies: 1,000 Years on the Road Gypsies in England have an annual fair where horses are bought and sold. In the first week of June, the larger part of Britain's 75,000 gypsy population gathers at the town of Appleby for the famous horse fair for horse dealing. During this time, silver caravans and trailers arrive at the site — one of the world's very few remaining displays of gypsy culture. Travelers have been coming to Appleby for hundreds of years. References to the fair itself are found as early as 1176 and it is believed that gypsies started to attend it in the 13th century. Throughout the year, gypsies travel around Britain, working and taking part in other fairs. From Appleby, the gypsies move on to another town, St Boswell's on the Scotish border, and on to Cambridge- shire to pick strawberries there. Then they head for the Stow-on-the-Wold and Barnet fairs. That's it until the next season, which begins with a week of horse racing at Epsom. The Epsom Derby race is the main horse racing event of the gypsy calendar. As the saying goes, "You're not a proper gypsy if you don't go to Epsom." What makes a gypsy? This has proven to be a very difficult question to answer. It seems that the gypsy people left northern India in the 10th century, gradually working their way westwards and picking up parts of different languages and various cultures along the way. The use of the word "gypsy" as a description for Romany people actually came about by mistake. When these mysterious dark-haired people began arriving in England in the Middle Ages, people assumed that they came from Egypt. Gypsy is a modification of the word Egyptian. The gypsy people are described using the word "Rom", which includes all descendants of the people who left India a thousand years ago. Today, it is believed that there are around 15 million Romanies in the world. Many do not reveal their gypsy roots to avoid the trouble it can bring them. They conceal their language too. In England in the 16th century, the punishment for speaking Romany was death. Gypsies and non-gypsies often do not trust each other. In fact, gypsy customs are rarely revealed and outsiders are hardly ever accepted into the gypsy communities. Gypsies are nomadic people, who do not lead settled lives, and they claim to be a specific people, a nation among nations. Most people despise gypsies for their lifestyle. However, gypsies are proud of themselves and have maintained their lifestyle of traveling and working, along with their customs and religion through the centuries. They will undoubtedly continue to do so in the future.

37 The Yanomami Of The Amazon The Yanomami people live in the Amazon forest between Venezuela and Brazil. They live in the tropical forest far away from other people. There are about 20,000 of them in 200 villages. Before scientists visited them, they didn't know anything about other people in South America, about the government, or about modern life. They even did not know whether they lived in Brazil or Venezuela. They lived in their own world. All of the Yanomami's materials and food came from the forest. There was really no need for clothes so they only wore a few leaves for clothes. The Yanomami people of the Amazon have survived for thousands of years by hunting and fishing in the Amazon River. There wasn't enough area in the forest for farming so they didn't grow any crops at all. They ate bananas and palm fruit and the animals they hunted. As they ate healthy food, they never got ill. They used stone axes and bamboo knives to hunt and catch fish with. In the late 1940s, scientists started to visit the Yanomami often. They wanted to study them for an unusual reason. The Yanomami are some of the most violent people on earth. They get angry quickly and stay angry for years. They frequently fight and kill each other so there is always a war between villages. Scientists want to know why the Yanomami make war when other groups of people live together and do not make war. Today the life of the Yanomami is changing very fast. They wear clothes now. They have learnt to eat different kinds of food with salt and fat from visitors that come from the modern world. However, this food is bad for the Yanomami and makes them sick. Every time they get something new, they want more modem things. However, the modern things are killing the Yanomami. In the 1970s, gold was discovered in the area and many modern companies went there for gold. There were about 80,000 miners from big cities in the area by 1987. They worked under the ground to find gold. The miners brought many diseases like hepatitis and tuberculosis, which killed many of the Yanomami people. They also cut down trees in the forest for wood. In 1991, Brazil and Venezuela made the Yanomami land into a park, so that no one could mine for gold or cut trees on this land any more. The Brazilian and Venezuelan governments have also attempted to save the Yanomami in other ways.

38 SURINAME Suriname, home to a spectrum of native, Asian, African and European cultures struggling to build a common future, is South America's youngest nation. It was founded as a colony by the British in 1650 and then it became Dutch in 1667. Today, Suriname's population of 430,000 is made up of 37% Hindustani, 31% Creole (mixed African and European ancestors), 15% Javenese, 10% Maroon and the rest Indian and Chinese. 90% of the population lives along a narrow strip of fertile land that stretches along the Atlantic coast. Here, people of African and European origins live together with people who have Chinese, Indian and Indonesian origins and Paramaribo, the capital, reflects this diversity. People are tolerant of one another's religion and culture. Mosques and synagogues stand next to Hindu temples. Music is heard everywhere and it's as varied as the people: reggae, Hindi film songs, and Surinamese Afro- pop. In the early years of their rule, the Dutch were often very harsh to the natives. In more recent years, though, they were so generous that the colony enjoyed £he highest standard of living in South America. Indeed, when Suriname gained its independence from the Netherlands in 1975, 40,000 Surinamers, nearly half the workforce, chose the option of Dutch citizenship. Soon after that, they moved to the Netherlands. This brain-drain made the already bad economy worse, since many who had left were from the professional classes. After 1975, the country experienced a military dictatorship and a civil war, as a result of which the Dutch financial aid was stopped. Suriname was so badly in need of cash that it was considering selling off 40% of its forest to Asian logging companies. However, with the help of Conservation International (CI), the government was convinced that long-term commercial alternatives, like ecotourism, would be much more profitable than selling its forests. Therefore, Suriname and CI announced the creation of the Central Suriname Nature Reserve, a four-million-acre preserved area that covers 10% of the country. Today, Suriname is known to be a country of rain forests. Because it lacks roads and rails, Suriname's interior, where the Suriname Nature Reserve is located, can only be crossed by airplane. Such areas protect wildlife and offer forest people the promise of income from ecotourism. Nearly 10,000 native Indians live in riverside villages, largely dependent on the forest. These forests are home to 700 bird species and 4,500 plant species. As the country is so rich in plants, the people's knowledge of the medicinal properties of the plants is incalculable. In the north of Suriname, logging and mining are two important sources of income. Timber and gold attract foreigners with promises of fortune. Logging is tightly controlled, but as a result of illegal mining to smuggle gold to Brazil and French Guiana, much of the habitat has been destroyed.

Today, most Surinamers have realized that they must depend on one another if they want to move forward. In the end, it has become clear to them that the forest is the best alternative for a young nation anxiously in search of itself.

39 Barasana Indians of The Vaupes The Vaupes region lies near the Equator on the border of Colombia and Brazil; the River Vaupes, rising from close to the Andes, flows east to join the Rio Negro, a tributary of the Amazon. In clearings on the banks of the river live some fifteen thousand Amazonian Indians who make their living by hunting, fishing and agriculture. They are divided into many small groups, each of which speaks its own language. Despite this, all the group languages belong to a common family called Tukanoan. Legends of the Vaupes Indians suggest they came from the East, but some carvings on the rocks indicate that they have been in the region for a long time. The Barasana, who are the most well-known group of Amazonian Indians, have no villages; instead, small groups of people live in malocas (communal houses), each one separated from its neighbors by about an hour's journey. People in nearby malocas often visit each other to attend dances and wedding ceremonies. More distant people are rarely visited and often regarded with suspicion. Indians prefer to build malocas close to the bigger rivers where fishing is good and travel is easy. From the air, the large gardens, or chagras, around the malocas look like light green holes in the forest. Each maloca is surrounded by a cleared space or plaza. Behind the house are smaller gardens for special plants used for medicines and drugs, peppers for cooking and tobacco. Banana trees around the plaza provide fruit and their leaves are used for serving food. The lives of Barasana men and women are sharply divided. Inside the maloca they use different doors and carry out their separate tasks in different areas. Outside, women work in the gardens, and men in the forest and on the rivers. The world of women revolves round the care of children, growing crops and manioc, a type of plant with large roots. The process required to turn manioc into food is lengthy and time-consuming, but the root does produce a good crop in poor soil, and many different foods can be made from it. Though the groups have names like the Tukano, Cubeo, Desena, and Barasana, they are not really independent tribes; they share a common culture and a way of life because each group intermarries with its neighbors. Children are taught to speak their father's language but they know their mother's perfectly, too. Adults always speak in their own language but as they also know up to five others, they have no difficulty in understanding each other. On marriage a young man builds himself a compartment inside the maloca. When his wife has a child, he must stay with her in the compartment for ten days, fasting and avoiding work. When children reach the age of 5, they spend much of their time playing with other children of the maloca. Older children, especially older sisters, are expected to look after younger ones. Children do not go to school but learn by playing together, watching their parents and

working with them. By the time they are six, young girls begin to help their mothers. Compared to girls, boys are freer. They swim in the rivers and practice hunting with miniature bows and arrows, or blowpipes. Later they begin to hunt and fish more seriously, bringing small birds and fish to their mothers to cook. Women often go with their husbands and children to visit their parents and brothers in neighboring malocas; their husbands usually take along gifts of food or baskets to give to their in-laws. At sunrise and dusk men sit out in the plaza talking with their wives and playing with their children, a family time that contrasts with their separation for the rest of the day. The Indians' religion is based on myths or stories about the beginning of time which they believe to be true. They say that the sun made the world in the form of a big maloca. In the beginning there were no people. The first ancestors, the sun's children, came into the world through the front door in the east, and swam up river in the form of anacondas, giant water snakes. As they traveled, they stopped at the rapids on the way to dance and sing. Carved on the rocks in the rivers there are strange figures and patterns, said to have been left there by the first people. When they got to the Vaupes region, the anacondas turned into people. Each anaconda made people of a different language.

40 The Mohana The Mohana fishermen of central Pakistan are one of the oldest societies in human history. They lead a life that has not altered 'for 5,000 years. They live in houseboats that are attached to each other by ropes to form floating villages on the banks of the River Indus in the region of Sind. Few other living creatures survive there. The climate is unpredictable and travelling down the river is too dangerous. The Mohana live as they have always lived: each person's role in the society is determined. There are three castes, which are determined by the traditional river trades: fishing, boat building and ferrying. The fishermen, or the shikari, are the most unusual. They fish in the shallow waters along the sides of the river for catfish and turtles. This is no easy task: the alluvial currents make it almost impossible to locate the fish. The solution is to use herons, a kind of large bird. Herons have oils on the surface of their eyes that function as colour filters. These enable them to detect fish below the surface of the water, which they then dive for and catch. However, a trained heron will stand still above the fish instead of diving. 'The fisherman approaches the heron in a boat, jumps into the water and traps the fish in a net known as the kulari. The Mohana have never kept herons in captivity. There are so many in the region that it is not necessary. Instead, they train fully-grown specimens. The idea of training herons may seem impossible to Europeans, but for the Mohana, this is a part of everyday life. Despite their skills, the shikari, who make up nearly two-thirds of the Mohana people, are the lowest in rank among the three castes. Above them are the kurnangar, or carpenters, who build both the rowing boats and the houseboats in which the Mohana live. The highest caste of all is the mirbamar, who ferry, or carry, cargoes by boat to the northern and southern parts of Sind. They are the smallest caste but own most of the community's wealth. Despite their long his ton,-, all these castes face a similar fate now: extinction. In other words, they probably won't be able to survive the 21st century. On one side, they are threatened by problems as old as their own traditions. They have to pay about half of their incomes to their feudal lords, the 3arnidar; who own the banks of the river. The rest of their income is often taken by armed robbers from the jungles of northern Sind. On the other side, they face modern dangers. Seven dams that have recently been constructed between the Punjab and southern Sind have closed trading routes for the mirbamar and killed many of the fish on which the shikari depend. Moreover, the Mohana do not have enough contact with other Pakistanis to survive in the 21s' century. They make no contribution to the country's economy as they are illiterate and nomadic. What's more, the rest of the population, most of whom are

Muslim, do not approve of the Mohana's religious beliefs. It seems that although the Mohana civilisation has survived for 5,000 years, it will not last another twenty years.

41 The Qualities We Prize In Our Children A recent international study has shown some surprising and apparently contradictory results on the question of the priorities parents around the world have when raising their children. While the survey shows that some virtues are universally prized, interesting regional and national trends emerge when parents are asked to rate the importance of various qualities they wish to instill in their children. Parents around the world seem to agree that good manners, a sense of responsibility, and respect for others are important qualities to teach their children. However, while West Europeans give all three qualities more or less equal importance, East Europeans and North Americans rate a sense of responsibility as by far the most important, and relegate respect for others to third place. Interestingly, a sense of imagination ranks the lowest priority worldwide, although West Europeans give the quality of flexible thinking twice the importance any other group does. The Italians stress the virtue of cultivating their youngsters' imagination more than most others surveyed, with the exception of Switzerland. The supposedly staid Swiss prize imaginative youth. Etiquette-minded Belgians, Spaniards, and Greeks place the highest premium on politeness, while the Danes and Swedes put good manners lowest on the list. The newly-capitalist Eastern Bloc countries also rate good manners as relatively unimportant, perhaps because they are being confronted, or faced with, commercial competition for the first time. Together with the Swiss and the Turks, on the other hand, they prize the ability to communicate with others. The virtues of tolerance and respect for others are most highly regarded in Scandinavia, France, Britain, Switzerland, the Netherlands, and Spain. This is not the case in Greece and the former Eastern Bloc nations, which rate these as being of lesser importance. Germans, Austrians, and Swedes esteem personal independence, but the industrious French hold the quality of conscientiousness at work, that is, doing their work carefully and properly, more dear than any other European nationals. The responses in the industrialized nations of Sweden and Britain show, perhaps bewilderingly, that those nations give little importance to conscientiousness at work. As for the qualities concerning obedience and religious beliefs, the results are also interesting. To start with, polite Belgians answered that for them, obedience is among their paramount values; this sentiment is shared to a lesser degree by the British, Greeks, and Irish. The Italians, according to their questionnaires, rank this very low. Second, when rearing their children, the Greeks, Turks, and Irish are alone in their emphasis on instilling strong religious beliefs.

One of the primary difficulties the researchers faced was translating the questions as perfectly as possible in order not to distort, or misrepresent, the results. "Imagination," for example, can be translated into Dutch as "conceitedness"; perhaps this explains why the Dutch appeared to give imagination a low priority. The researchers also discovered that some qualities are so ingrained in certain cultures that they are taken for granted — in other words, they are believed to be true without being questioned — while others are given great emphasis because they are felt to be lacking in a particular society.

SPACE & ASTRONOMY

42 Comets Comets are just as much members of the Sun's family as are the major and minor planets. There can be very few people who have not heard of Halley's Comet, but there are still a great many who have no real idea of what a comet is. The most popular mistake is to assume that a comet moves quickly across the sky, disappearing in a few seconds. In fact, all comets are very distant and they do not move perceptibly against a starry background. If you see an object moving visibly, it most probably is not a comet because most comets are extremely faint objects, far beyond the limits of the naked eye. Although comets are members of the solar system, they are quite unlike planets. They are not solid or rocky. A large comet consists of an icy central part called the nucleus, a head, and a tail, or tails made of tiny particles of 'dust'. Though comets may be immense — the head of the Great Comet of 1843 was larger than the Sun — they are very flimsy. Even a direct collision between the Earth and a comet would cause no more than a local damage. Comets move around the Sun, and with one exception — Halley's — all the really bright comets take hundreds, thousands or even millions of years to complete one orbit. This means that we cannot predict them, and they are always liable to take us by surprise. Comets usually arouse public interest when they are large and bright enough to attract attention and receive mention in the newspapers, but objects of this type do not appear frequently and have been particularly rare during the present century. There are many short-period comets which reappear only after a few years but these are faint, and usually remain well beyond naked-eye visibility. Moreover, they usually lack tails and appear as nothing more than tiny patches of light. Haley's Comet is in a class of its own. It has a period of 76 years, and it has been seen regularly since well before the time of Christ.

43 The Milky Way On dark, clear nights we can sometimes see a creamy strip running across the sky. This is Milky Way, the galaxy in which we live. A myth of the ancient Greeks said this long whit mark was a "river of milk". The ancient Romans called it the Via Galactica, or "road made of milk". This is how our galaxy became known as the Milky Way. Until the invention of the telescope, nobody really knew what the "Milky Way" was. About 300 years ago, telescope showed a very surprising fact: the Milky Way was made of stars. Only 70 years ago, more powerful telescopes brought the further revelation that the Milky Way is only one galaxy among many, the 1920s, an American astronomer, Harlow Shapley, was the first to realize that our sola system is not at the centre of the Milky Way. The Milky Way contains about two hundred billion stars and countless other objects. The size of our galaxy is huge; light would take about 100,000 years to cross it. Like other spiral galaxies, the Milky Way has three main components: a bulge, a halo and a disk. Although all: parts of the same galaxy, each contains different objects. The halo and central bulge contain! old stars and the disk is filled with gas, dust, and young stars. Our Sun is one of these fairly! young stars. Our Sun is about 5 billion years old; however, the Milky Way is at least 5 billion years older j than that. Our Sun is located roughly 24,000 light years from the center of the Milky Way. The '! Sun is revolving around the center of the Galaxy at a speed of half a million miles per hour. Therefore, our solar system must have made only 20 or so orbits around the Milky Way since the Sun began to shine.

44 The Origins Of The Moon For thousands of years, people have looked up at the night sky and watched the moon. They wondered what the moon was made of. They also wanted to know how big it was and how far away it was. One of the most interesting questions was "Where did the moon come from?" No one knew for sure. Scientists developed many different theories, but they could not prove any of these. Then, between 1969 and 1972, the United States sent astronauts to the moon. They studied the moon and returned to the Earth with rock samples. Scientists have studied these pieces of rock, die moon's movements, and information about the moon and the Earth. They can finally answer some questions about the origin of the moon, which was impossible before the trips to the moon. Today most scientists believe that the moon was formed from the Earth. They think that a large object, perhaps as big as Mars, hit the Earth early in its history. When the object hit the Earth, huge pieces of the Earth broke off because of this great impact. These pieces went into orbit around the Earth. After a short time, the pieces came together and formed the moon. This 'impact theory' explains many facts about the Earth and the moon. For example, the moon is very dry because the impact created so much heat that it dried up all the water. The Earth has iron in its center. However, the moon has very little iron in its center. This is because the moon formed from lighter materials that make up the outer part of the Earth. No one can prove something that happened billions of years ago. In the future, new information will either support this theory or show that it is wrong. For now, scientists accept the impact theory because it explains what we know today about the Earth and the moon.

45 The Moon The Moon is the only natural satellite of the Earth. It was first visited by the Soviet spacecraft Luna 2 in 1959. It is the only extraterrestrial body which humans have visited. The first manned landing on the Moon was on July 20, 1969; the last was in December, 1972. The Moon is also the only body from which astronauts have brought back samples to Earth. In the summer of 1994, the Moon was mapped in detail by the little spacecraft Clementine, and again in 1999 by Lunar Prospector. The gravitational forces between the Earth and the Moon have some interesting effects. The most obvious is the tides. The Moon's gravitational attraction is stronger on the side of the Earth nearest to it and weaker on the opposite side. Since the Earth is not perfectly rigid, i.e. fixed and inflexible, it is stretched out toward the Moon. This results in two small bulges on the Earth's surface, one in the direction of the Moon and one directly opposite. The effect is much stronger in the ocean water than in the solid crust, so the water bulges are higher. And because the Earth rotates much faster than the Moon moves in its orbit, the bulges move around the Earth about once a day creating two high tides in oceans and lakes. The Moon appears to turn slightly (due to its slightly non-circular orbit) so we can see a few degrees of the far side from time to time. The majority of the far side was completely unknown until the Soviet spacecraft Luna 3 photographed it in 1959. Actually, there is no "dark side" of the Moon; other than a few areas with deep craters near the poles, all parts of the Moon get sunlight half the time. There are basically two types of terrain, or land, on the Moon: the heavily cratered and very old highlands, and, opposite them, the relatively smooth and younger maria. Most of the surface of the cratered highlands is covered with regolith, a mixture of fine dust and small rocks produced by meteor crashes. For some unknown reason, the maria are concentrated on the near side. The maria (which cover about 16% of the Moon's surface) are huge craters that were later filled with lava. A total of 382 kg of rock samples were returned to the Earth by the Apollo and Luna programs. These provide most of our knowledge of the Moon. They are particularly valuable because they can be dated. Even today, 30 years after the last Moon landing, scientists still study these precious samples. Most rocks on the surface of the Moon seem to be between 4.6 and 3 billion years old. Thus, the Moon provides certain evidence about the early history of the solar system which is not fully available on the Earth. Before the study of the Apollo, Luna 2 and Luna 3 samples, there was no agreement among scientists about the origin of the Moon. There were three principal theories: co-accretion, which said

that the Moon and the Earth formed at the same time from the Solar Nebula; fission, which claimed that the Moon was formerly a part of the Earth; and capture, which held that the Moon formed somewhere else and was later captured by the Earth's gravitational field. None of these is very reasonable. The new and detailed information from the Moon rocks led to the impact theory: that the Earth crashed into a very large object (as big as Mars or more) and that the Moon formed from the discharged material. There are still details that scientists are working on, but the impact theory is now widely accepted.

46 Venus Venus is one of the most unusual planets in our solar system. It is the second planet from the Sun, located in between Mercury and Earth. The Orbit, or path, Venus follows around the Sun is circular, and the planet's distance from the Sun is about 65 million miles. As Venus is closer to the Sun than Earth, a Venusian year is just 225 Earth-days. Venus rotates around itself much more slowly than Earth, so a day on Venus is 243 Earth-days. This means that a day on Venus is longer than its year! Even more strange is the fact that Venus rotates from East to West. This is just the opposite of Earth and most of the other planets. Venus is the brightest object in the sky after the Sun and the moon. It is visible to the naked eye for several months. As Venus appears both in the morning sky and the evening sky, ancient astronomers thought it was two different objects and called it Eosphorus and Hesperus. Venus is similar to Earth in some ways. Venus is almost the same size as Earth, with a diameter of a little over 7,200 miles. Both have craters on their surfaces. Their densities and chemical compositions are similar. Venus probably once had large amounts of water like Earth, but it all boiled away so Venus is quite dry now. Because of these similarities, scientists thought that below its dense clouds Venus might be like the Earth and there might even be life on it. However, more detailed study of Venus showed that in many ways it is different from the Earth. The atmosphere of Venus is about 90 times heavier than the Earth's atmosphere. It consists mainly of carbon dioxide (96%). 3.5% of the atmosphere is nitrogen and less than 1% is made up of carbon monoxide, argon, sulfur dioxide and water vapor. There are also several layers of clouds that cover the planet. These clouds are many kilometers thick and they are made of sulfuric acid, which is an extremely dangerous substance. These clouds obscure our view of the surface of Venus. In other words, we can't see the surface of Venus from the Earth. There are strong winds at the cloud tops, averaging around 350 kilometers per hour, but the winds on the surface are very light, no more than a few kilometers per hour. A lot of information about Venus comes from spacecraft that study the planet from a safe distance. They cannot get very close to the planet because of the high temperature. The density of the atmosphere of Venus leads to an increase in the surface temperature and makes the planet one of the hottest places in the solar system. The temperature on Venus reaches 450°C, which is very hot and can melt most metals; that is, the high temperature can turn most metals into liquid. For this reason, scientists are looking for a different way of collecting information about Venus from Earth. A few years

ago, they made a map of the planet's surface using radar telescopes here on Earth. They found that Venus' surface has many mountains (some higher than Mount Everest) and volcanoes. There are also large flat lands called plains on its surface.

47 Nasa Listens For Space Aliens The idea that "We are not alone in the universe" and movies like E.T or Star Wars have always fascinated people, though in reality, most people don't believe life on other planets exists. However, NASA assumes there's a good chance that we're not alone in the universe. Last fall, NASA began a new project called the High Resolution Microwave Survey (HRMS), whose purpose is to find evidence of life in one of the billions of galaxies in the universe The search for intelligent life on other planets isn't new. In fact, it began in the early 1900s. Scientists built a huge transmitter to beam radio waves into space then. They thought intelligent beings on other planets might pick up the signals. Recently, scientists have also sent a message about humans and our solar system to a nearby constellation. However, as the constellation is 25,000 light years away, a return message won't reach Earth for 50,000 years, so don't expect an answer for now! So far, no ETs (extraterrestrial beings) that we know of have returned our "calls", but according to Dr. Jill Tarter, who is an HRMS scientist, we haven't exactly had our ears wide open. "Now, however," says Dr. Tarter, "we've built the technological tools we need to listen well." Last October, Dr. Tarter turned on the largest radio receiver in the world. It's a huge metal bowl stretching 1,000 feet across a canyon in the jungles of Puerto Rico. Meanwhile, another NASA scientist flipped on a huge radio antenna in California's Mojave Desert, where NASA hopes to pick up radio signals from other worlds. Dr. Frank Drake has been searching for life in outer space for years. He explains the HRMS project this way: To listen to your radio, you move the tuner on the dial until the channels come in loud and clear. Now imagine radio receivers that scan our galaxy listening to 14 million channels every second. That's what NASA's radio telescopes in Puerto Rico and California are doing. However, that's not all. Powerful computers in the telescopes carefully examine ever)- signal. They try to match the signals to the ones that scientists already recognize, such as human- made signals. If they can't, Drake and Tarter check on them. "It could prove there is radio technology elsewhere in the universe," says Dr. Tarter. "And that would mean we're not alone." "Whenever I look up at the stars," Dr. Tarter adds, "it seems ridiculous to think we are alone." After all, she reasons, there are billions of galaxies like our own and each has hundreds of billions of stars like our sun. As each sun might also have planets, it's very likely that some of those planets support life as Earth does, and she believes that some of that life could be intelligent.

That leads right to the next big question: If there are intelligent ETs out there, are they trying to reach us? There's no way to know for sure, but according to Dr. Tarter, it might not matter. "If they have the technology, their signals may reach us, just as our TV signals may reach them." Dr. Drake is also confident. "I fully expect to find signals from an extraterrestrial before the year 2010. However, we have to be cautious when revealing our research findings as any misunderstanding may create a panicky situation. Therefore we have arrived at a decision: We are not going to immediately announce the results of the studies that might show the existence of space aliens to the public." he says. However, not all scientists are that certain of discovering life in other galaxies, but who knows? If Dr. Drake is correct, the year 2010 just might bring us a group of new space neighbors!

48 Mission To Mars Astronomers all over the world were waiting in excitement as August 1993 approached. Mars Observer, the American spacecraft, was scheduled to move into orbit around Mars and begin sending new information back to Earth. In addition to mapping the planet, Mars Observes was going to study the Martian atmosphere and surface. Unfortunately, no information] reached the Earth as scientists lost contact with Mars Observer on August 24. The Mars Observer mission, which cost $845 million, failed. Unlike Mars Observer, the United States' previous mission to Mars was successful. In 1976 two American spacecraft, the Viking landers, landed on Mars to search for life. They

Table of Contents:

combined cuts 1.jpg

Ben Deri (on the left) and Nadeem Nawara

Prologue:

As with any incident between Israel and Palestine, the case in-front of us cannot be judged detached from the historical context that created it and the political predispositions that interpret it. And yet, some truths do not derive from the pages of history and seem to self proclaim their independence from any specific time or context. One such moral truth, is the rejection of the act of murder, in any form it may appear.

This text is an investigation into the killing of Nadeem Nawara, and the trial of the soldier who shot him, Ben Deri. It is designed to walk you through all the evidence of the case, so you can derive your own conclusions (though i certainly share my own):

Is Deri a clumsy hero who made a technical ammunition mistake – as his defense and Israel would have you believe –  or a serial killer of Palestinians, who carefully planned to conceal live fire as non-lethal rubber coated bullets,  motivated by nationalism and racism towards Palestinians and Arabs?

As the incident before us was widely covered throughout the world and gave rise to many conspiracy theories that attacked every detail and piece of evidence, this text is quite lengthy, as it in turn tackles back each of these theories. From objective non-Israeli eyes, this might seem ridiculous or insane, but in Israel (and pro-Israel spheres) the objective eyes are considered naive if not antisemitic. For many if not most Jewish-Israelis, all Palestinians killed by Jews were terrorists and all the Jews who killed them are heroes, until proven otherwise beyond unreasonable doubt.

I realize that many find the forensic and legal investigation of a criminal case to be boring, but i believe that the more you go down the rabbit hole and the twists and turns of this trial, the more you’ll find it captivating. In many ways, it will also give you a picture of the Israeli-Palestinian conflict as a whole, and the current Israeli beliefs and rationalizations, with regards to killing of Arabs by the armed forces.

%d7%93%d7%a8%d7%99-%d7%9e%d7%a9%d7%95%d7%a2%d7%9e%d7%9d-%d7%91%d7%91%d7%99%d7%aa-%d7%94%d7%9e%d7%a9%d7%a4%d7%98-%d7%9e%d7%90%d7%97%d7%95%d7%a8%d7%99-%d7%a6%d7%99%d7%95%d7%9f-%d7%95%d7%a2%d7%9d-%d7%94

Ben Deri bored during the trial, next to his girlfriend and Tzion Amir, his lawyer.

In any case, laziness does not exonerate us: the accused, and he alone, enjoys the presumption of innocence. All that his and Israel’s uninformed supporters and defenders could prove, is innocence due to ignorance. And from the rag of ignorance, one cannot wring innocence – even with a strong hand and an outstretched arm.

On the other hand, the purpose of this article is not to generalize: A criminal amongst us (Israelis) is not proof of the criminals that are us. But those who knowingly acquit the guilty, are equally guilty of the crime.

It is common belief in Israel, that the Israeli army is the world’s most moral army, while simultaneously believing that it is immoral to judge soldiers in that army, for any crime they might commit against Palestinians. But infallibility is fallibility at its prime, and morality unquestioned, is without question immoral.



The following is the English translation of the original Hebrew investigation, which can be found here. Please excuse any grammar mistakes or just general linguistic awkwardness, as this isn’t my native tongue (but do leave a comment and I’ll fix the issue mentioned).

Eishton is an Israeli anonymous investigative blog, which relies solely on donations from its readers. The following post is the result of roughly 350 hours of research, writing and editing + 80 hours for the English translation. If you found the content worthy, please donate by clicking here.



The table of contents is for technical purposes only, so don’t waste your time reading through it. Clicking on the subjects will take you to that specific location and then you can copy that link from the browser, if you want to share directly to a certain sub-section.

Thursday, may 15th 2014, 13:45pm – During a Nakba Day stone throwing demonstration in Beitunia, Palestine, Ben Deri, a border police officer (which in Israel is basically another part of the army), was caught on tape shooting Nadeem Nawara, as he was walking unarmed:

Roughly an hour later and almost in the same location, Mohammad Abu Daher was shot in the back, as he was walking away from Deri and his force:

Two more Palestinians were injured by live fire during the protest (in the chest and arm) but Nawara and Abu Daher did not survive.

The security cameras footage was watched the world over, and right from the start Israel and Pro-Israel crowds (mostly in the US) claimed that the video is fake or as they call it, “pallywood”, meaning Palestinian-Hollywood: directed and scripted movies, designed to frame Israeli soldiers of unjustly attacking\killing Palestinians.

Israel’s politicians, army and media, either gave rise to these theories or backed them up. Deri and his force claimed to have only shot rubber coated bullets that day. In Israel, the whole incident became a joke which supposedly exposes the patheticness of the Palestinian Pallywood and those gullible bleeding heart lefties, who buy in to it. This view is most clearly demonstrated in a series of YouTube clips which started appearing in the days following the incident, such as the following clip, which according to its cynical creators “was recorded by a reliable Betzelem (Israeli human rights organization)  volunteer and is corroborated by an eye witness testimony from Stevie Wander”:

But a month later all those voices vanished discretely as the autopsy of Nawara’s body, conducted in-front of Israeli, American and Norwegian pathologists, concluded Nawara was shot by a live bullet. The fragments found in his body matched the bullet found in his backpack (after it traveled through his body), and the bullet in turn, matched Deri’s rifle.

Abu Daher’s family decided not to exhume his body. Generally speaking, Israel doesn’t actively and seriously tries to investigate suspected killings\attacks of Palestinians, if not forced to do so by evidence handed over  by the Palestinians themselves (or some human rights organization). As such, Deri wasn’t charged with the killing of Daher or the attempted killings of the two injured. Nadeem’s father, Siam, on the other hand, backed Israel to a corner as he went on CNN and said he demands an autopsy in front of international representatives.

But despite all the evidence you just read about (and much more to come), which sound like an open and shut case, a few weeks ago the prosecution offered Deri a plea deal, convicting him only with criminally negligent homicide. On Jan 29 2017, Deri accepted the deal.

So how did we go from a fake Pallywood incident, to multiple murders, to a single manslaughter charge, and finally a technical mishap? Is Israel truly conducting a just trial or just seeks the appearance of one? Is this a serial killer or a brave warrior tormented by lawyers & lefties, whom aspire to “tie the hands of the soldiers”, as the Facebook protest surrounding the case claims?

ידיים באזיקון.jpg

As we’ve seen, prior to the trial all sorts of conspiracy theories arose, clearing Deri of blame and placing it on Palestinian Pallywood. On any other trial, these insanely complex theories would have been dismissed as preposterous. But our Israeli judges and the Judges that we become as Israelis when exposed to such incidents, are all a product of our informal education, which guides us towards a predisposition to favor the Jewish soldier over the Palestinian stone thrower, without it requiring a single racist thought.

For the past 2 decades, Israelis have been told – perhaps indoctrinated – that there exists a vast cinematic industry in Palestine, called “Pallywood”, which produces frame-up movies of Israeli soldiers killing Palestinians (Note: we aren’t talking about lies, incitements or edited content, but actual video productions with scripts, directors and actors). Thus, for Israelis, the denial of documented wrong-doing doesn’t require active racism. An elaborate scheme fitting of a “mission Impossible” movie, becomes not only a plausible explanation, but rather the obvious one, which isn’t a burden on the accused soldier to prove, but a requirement from the dead Palestinian to disprove.

It is in that state of mind, that Israel’s minister of defense (at the time), went on national TV, prior to even seeing the footage, and explained: “I’ve seen many such edited movies and i know this tactic”. But in reality, he hasn’t. Non of us have. We just feel like we have.

I’m not going to get into this subject in length, but suffice to say that in the 50 years of Israeli occupation beyond the 1967 border, and more than a 100 years of conflict, there are only 2 incidents that the Palestinians are even suspected (by Israelis) of directing a fake live event: The death of Muhammad Al-Durrah and “the fake funeral“.

The funeral doesn’t involve any Israelis at all. So contrary to common belief and whats echoed in the media, there is only one instance were Palestinians are suspected of Pallywood incorporating Israeli forces (which obviously makes it very hard to do, as they are not “in on it”) – and even that instance, has never been proven as Pallywood (Because Al-Durrah’s body wasn’t exhumed and because the army, claiming operational necessity, bulldozed the wall behind Al-Durrah, before anyone could test the bullets inside it).

Part of the negligence by the prosecution in Deri’s case, is not the result of not doing their regular job, but rather that it didn’t or chose not to understand, that its normal standard would be insufficient for this case. If a single case of Pallywood, which hasn’t even been proven, was sufficient for most Israeli to believe that Pallywood is not only real but common enough to justify an acquittal, than the prosecution should have prepared the case for that standard (as unfair or constitutionally unjust as that is).

On top of that, the Palestinians are represented by lawyers of varied capabilities and experience, appointed by the state, while the soldier is free to choose his own lawyer. Usually it’s just the “normal” case of the rich-over-poor advantage, that we all know exists in the criminal system. But this becomes significant because even poor soldiers, such as Deri, are crowdfunded by thousands of Israelis and far-right organizations, who back up any Jew in Israel accused of killing or attacking Palestinians (Same people who backed Deri also backed the settlers who fire bombed the Dawabsha family or the settlers who kidnapped Mohammed Abu Khdeir, beat him, forced petrol down his throat, and burnt him to death, from the inside out).

Though i don’t claim to have any evidence of an attempt to self-fail by the prosecution and the state, we do know that virtually no evidence or witnesses were added, above the ones who came forward on their own (mostly through Nawara’s family). Critical tests failed to produce results (such as DNA identification of the body) and the prosecution chose not to repeat those tests. The two prosecutors chosen for the case, are not well known or very experienced with murder trials. The judge presiding the case, Daniel Taperberg, was previously a family court judge, and this is his first criminal case. Now add all that to the initial and routine conflict of interest, that an Israeli court is deciding weather the Israeli army has committed a crime against people who are considered an enemy of Israel, and you can see how the deck was stacked against the Nawara family.

So, in this uneven light, let us mention the obvious:
An instant or two from the past, where the crime at trial was faked or an accused was framed, is not a reason for acquittal. There’s literally no crime in the criminal law books that looking back 50 years, you wont be able to find cases that turned out to be false accusations, frame-ups, forged evidence, etc (with no Palestinian involved). And we don’t set people free because of these rare exceptions.

Just to clarify the point, we have dozens of Israeli soldiers who were convicted in Israeli courts of killing\attacking Palestinians for no reason. Yet we don’t accept a generalization based on these incidents, claiming that the Israeli army as a whole, is immoral. But then, if dozens of incidents don’t justify a generalization, than surely just one or two in fifty years, do not. Or if we flip it:
If one (unproven) case of Pallywood is sufficient evidence by your standard, for dismissing all Palestinian footage of Israeli crimes as fake, then by that same standard, dozens of (proven) cases of soldiers attacking Palestinians, require that even without footage, we shall accept such claims as true.

Obviously i don’t agree with either. All i ask, is that you remain objective.

So while the state chose two non-exceptional prosecutors for the case, Deri’s crowdfunding raised hundreds of thousands of dollars, allowing him to afford one of the best criminal lawyers in Israel: Tzion Amir.

Amir has represented politicians, celebrities, heads of crime-families, and in our field, many killers of Arabs (including the two mentioned above: the Dawabsha’s fire-bombing and Abu Khdeir torching) and of left-wingers (including a co-conspirator to the murder of prime-minister Yitzhak Rabin).

Amir is most definitely a trial lawyer, aware of the false belief that trials are an objective process, of mathematically valuing evidence. He pushes the judge’s “Jew-button” as much as he can, even though the victim never hurt a Jew and Deri isn’t claiming self-defense. He systematically interrupts the prosecutors with disrespect bordering cursing, while calling them “girls” (the prosecutors are two women) and successfully manipulates the trial to his advantage. He walks into and widens all the gaps left in the investigation, by the negligent prosecution. All the while, he is well aware of the prosecution’s limited time and resources, and so he delays and prolongs, dragging the trial for as long as possible (50 court-dates were canceled thus far. almost of all of them at the request of the defense), all for the purpose of strong-arming the prosecution into a lenient plea-deal – not by the merits of the evidence, but by the short-coming of the process and system themselves. This strategy, as can be deduced from the negligence plea-deal signed  with the prosecution, has worked.

Contrary to their representation on TV, real criminal trials aren’t a battle between two clear narratives. While the prosecution explained what it believes happened, the defense only casts doubt on that explanation, while raising many theories and exonerating possibilities (many of whom contradict amongst themselves. A tactic known in courts as “Argument in the alternative“):

Nobody fired, if someone fired Deri wasn’t the shooter, if he was it wasn’t live fire, if it was no one was hurt, if someone was hurt it wasn’t the person seen falling down, if it was than that person wasn’t Nawara.

18511_656677251132262_7853593071230344139_n

Ben Deri

On top of all of these, the defense also claims a parallel theory:

Deri did shoot live fire that did kill Nawara, but he thought he was shooting rubber coated bullets.

As a good attorney ought to do, Amir points the flashlight to wherever doubt is found (and even where it isn’t), to the point where you lose sight of the big picture and all you see is uncertainty.

Since the defense doesn’t provide a single definitive version of what Deri claims happened that day, i will now deal with all the options they raised – from the reasonable ones to the conspirative and irriational.

before we start, a quick word from judge Alfred Denning, on the burden of proof and what is required in order to find a man guilty of a crime:



“It need not reach certainty, but it must carry a high degree of probability. Proof beyond reasonable doubt does not mean proof beyond a shadow of a doubt. The law would fail to protect the community if it permitted fanciful possibilities to deflect the course of justice. If the evidence is so strong against a man as to leave only a remote possibility in his favour which can be dismissed with the sentence “Of course it is possible but not in the least probable”, the case is proved beyond reasonable doubt; nothing short will suffice.”



As we’ve seen, the case sparked many claims of Pallywood, based on what is seen in the footage from the incident. We shall now run quickly through these claims, and dismiss them.

Ironically, all these theories of directed and staged death scenes, that come up every time footage of Palestinians getting shot by Israelis emerges, is mostly based on the fact that we are used to seeing people getting shot on movies that really are fake – AKA Hollywood. In other words, we are blaming Palestinians for faking death scenes, because their death scenes don’t look fake.

Why does Nawara break his fall with his hands?

As Nawara crashes to the ground, he extends his hands to break his fall. But if the shot killed him, how can that be? why doesn’t he fall like in the movies and instead protects himself in such a phony way?!

nawara extended arms.jpg

Roughly at the age of 6 months, as we start to crawl and approach walking, all babies develop a defensive reflex called the parachute reflex:

רפלקס הצנחן.jpg

Unless the bullet went through the brain or severed the spine, most falls will be accompanied by the parachute reflex. Nawara (and all the others shot that day), were not hit in these locations. Since they didn’t die immediately, they also chose to role and not remain face flat on the floor (as anyone would).

If Nawara was shot in the chest, why isn’t he blown backwards?

Another TV myth… this one i need not explain for TV giveth and TV taketh away. “The Mythbusters” dedicated a whole episode to trying to move a body with a bullet. Watch if you wish, as they move from guns, to rifles and almost cannons, and still fail to get any movement resembling the “Blown away” effect you see in the movies (Animal lovers warning: they test with a pig’s body):

Can you shoot live rounds through the rubber bullets launcher extension?

%d7%a8%d7%95%d7%9e%d7%94-%d7%91%d7%9c%d7%91%d7%93

A Rubber bullets launcher extension

A few days after the incident, Israel pretty much proved that the Palestinians were lying:

the extension seen on Deri’s gun is meant for rubber bullets only, and a live round could not have been fired through it.

This claim was not advertised by random internet trolls. This came directly from the IDF’s spokesperson, then repeated by Israeli politicians on CNN. The greatest effect (for Israelis) came from the prime time testimony of Yosef Yekutiel, who is an Israeli weapons expert who works with the IDF and the police, who almost laughed at the Palestinian accusation:

If this claim was true, it means the Palestinians were lying and the whole thing was Pallywood. And so i did the naive thing and went searching for the extension’s manual in the Israeli manufacturer’s website, and it turns out the weapons expert and the army itself were wrong:

rcc-95

3rd from the top: “Immediate 5.56-mm lethal firing capability without removing adapter”

You can shoot live bullets through the extension. It is specifically designed so that a soldier won’t have to unscrew the extension while someone is running at him with a knife.

The myth of the squirting blood also derives from the movies. Unless we’re looking at a head-shot or a severed artery close to the surface of the skin (like in the neck), a regular bullet wound will not produce squirts of blood or intense and immediate external bleeding. The security cams are not high definition, but you can see in this photo of the second victim that day, Abu Daher, that there was blood:

thar bleeding.png

M16 bullets create small entry and exit wounds, and most of the damage is internal (as was found in autopsy in this case). Like a leaking pipe inside a wall, it takes time for a significant amount of blood to leak out of the wounds.

Another myth is that there should be blood on Nawara’s entry wound, on his chest. M16 bullets are so fast, that as they move through the body they create sub-pressure behind them, and suck organs and liquids after them. That’s why, contrary to Hollywood, you are more likely to see blood from an exit wound than an entry wound. Nawara’s exit wound was covered by his backpack (which we will get into later), and so you see nothing. Abu Daher was shot in the back, and that’s why we see blood on his exit wound in the chest.

As for blood stains on the floor – both victims were lifted within seconds of getting shot and carried to an ambulance. Since blood doesn’t flows out like in the movies, there wasn’t and shouldn’t have been any blood stains.

Notice how every Pallywood accusation, actually proves the opposite:

If someone was directing a fake event and doing so as it’s done in the movies, we would have seen many things that would make sense to us (Nawara would have been blown back from the bullet without breaking his fall with his hands and while squirting blood all over), but would actually indicate real “Pallywood”. They accuse them of Pallywood, because it doesn’t look like the “real deaths” of Hollywood.

The video was first collected by Palestinian intelligence. They copied the content (later gave it to an NGO which published it) and when the Hard-drives were returned to the shop’s owner, they were erased. The owner testified they do it so Israeli forces wont get the footage showing the faces of the stone throwers, and than arrest them (as they do).

At first only 2 minute segments of each victim’s footage were released. A few days later, perhaps understanding the significance of the incidents and the relative insignificance of the stone throwing around them, all 12 hours of video from each camera, were released to the media. Deri’s defense asks: maybe during this time the Palestinians edited or manipulated the videos?

The video has been checked by the IDF and Israeli police, which found no editing or manipulation. In their testimony, some of the visual experts explained that it is extremely difficult to manipulate a movie in a manner that the IDF and the police could not trace. But in this case, because we have 4 cameras that each shares parts of its field of view with another camera, it is just impossible. Someone moving can be seen from 2 or 3 angles, doing the exact same thing. On top of that, we have lots of other footage from CNN and others, which also sync-up. Here is such an example which syncs CNN, the security cams and photos by Samer Nazal (Follow the circles):

The next video syncing (and there are many more) was conducted by a UK visual forensics company, in order to determine if Deri’s shot syncs to Nawara’s fall. They used the movement of a man in white, seen in both videos, to create a sync-point. From that point, they rewind the exact same number of frames in each video, until the shooting:

To watch the unedited Security cams footage you need to contact Betzelem. For the segmentd footage (in order to upload it to YouTube) see here: Camera 1 (1, 2), Camera 2 (1, 2, 3), Camera 3 (1,2,3,4), Camera 4 (1,2,3).

We’ve now went through all the simple theories, which mostly dealt with the videos and misconceptions about what happens in them. Now we go inside the courtroom and start dealing with the more complex theories that were conjured up. For the sake of keeping the text organized, i chose not to present the proceedings as they developed in the trial, but by focusing on each subject at a time.

The Backpack That Wasn’t There

When he was shot, Nawara had his backpack on him. The bullet, which matched Deri’s rifle, was found inside that bag, after it passed through Nawara’s body. He fell bleeding on his bag. he was carried and put inside the ambulance – all of this with his bag still on him.

On May 18th, 2016, Yeal Herman from the Division of Identification and Forensic Science in the Israeli police, testified that blood was found on a book and notebook inside the bag. That blood was found to be of a male offspring of Nawara’s parents (since the DNA test for Nawara’s body didn’t work, they tested it against the DNA of his parents).

%d7%93%d7%9d-%d7%a2%d7%9c-%d7%94%d7%a0%d7%99%d7%99%d7%a8

Blood on a notebook from Nawara’s Bag

Everything seemed to align with the accusations against Deri. But then Tzion Amir asks Herman about a critical problem in her tests (from the transcript of the trial):



  • Herman: i approached, looked and scanned the bag with my eyes, and couldn’t see [any blood stains].

    • Amir: what does it mean? listen, if i cut myself right now, the blood will spill on my clothes. than when you’d look, let say 5 minutes after, you would see a blood stain, right?
  • Herman: yes. A visual scan will indicate blood.
    • Amir: Good. and if i show you the same clothing 4 months later, when it was persevered in good conditions – like in our case – could you still see the blood stain?
    • Judge Tapergberg: Is the amount of time that passed meaningful to the possibility of detecting the blood?
  • Herman: No.
    • Judge Tapergberg: so if there was blood, there should be blood.
  • Herman: if optimal conditions are kept and it wasn’t, lets say washed.
    • Judge Tapergberg: IF there was a blood stain at the time of the event, you should’ve seen it when you looked at the bag?
  • Herman: could be. but it… i didn’t see any. maybe if I’d look at it today, more carefully i might…
    • Amir: go ahead, here! look at it again. scan it in front of us inside and out. look for blood where the bullet came in.
  • Herman: I can’t see any blood.
    • Judge Taperberg: Can you explain how you found blood in the notebook inside the bag, but no blood on the bag itself?
  • Herman: i can’t.


Blood on things from inside the bag, but no blood on the bag. Supposedly magic blood that jumped from Nawara’s body to Nawara’s notebook, without touching his bag? How can this be?

The vindicating tests that I’m not asking for:

Throughout the trial, dramatic testimonies and lab results that weren’t done or were screwed up, are explained in the court:
Cellphone location on Nawara’s phone, DNA identification of Nawara’s body, DNA extraction from the fragments pulled out of the body, DNA elimination-test of Nawara’s only male brother.

In all those instances, Tzion Amir yells and explains how frustrated he is of all the missing or screwed up tests, that would have exonerated Deri. If only cell-location was done, you would see Nawara wasn’t there. If only the DNA test didn’t fail, you would see the body wasn’t Nawara’s. And in our example: If only a biochemical test of the bag was requested, and not just a visual scan, you would see that there’s no blood on the bag. And if there’s no blood on the bag, but there’s blood inside it, than it must of been planted there!

There is only one thing that Amir is careful not to do, with regards to all those missing tests that would vindicate his client: Ask that they’d be done now.

The vindicating tests which can no longer be done:

The only instances that Amir does ask for tests, are when he knows they it can no longer be performed:

  • He demands the fragments and the bullet’s projectile be weighed, so we can check if they sum up to the original weight of the projectile (not a useful test since you can never be sure you found all fragments. mostly works in extremes: The combined weight is much more or less than the original projectile). But he already knows that one of the fragments was melted in order to test if it matches the bullet.
  • He demands to check the original recording of the security tapes when he already knows the original was deleted and that the copy was confirmed to be unedited or manipulated.
  • He demands to test the shirt Nawara was shot with, when he knows it was torn off him in the hospital and thrown away (and since the shot was from 80 meters, there would be no gun residue anyhow).

The Trick Turns Against his Maker:

In a criminal case, the prosecution is not allowed to continue its investigation during the trial. The defense has a right not to be surprised and to arrive at court when all the evidence and testimonies against the accused, are already known to him. The defense on the other hand, can do and ask to do, whatever it wants (within the constraints of the law of course).

And while the prosecution definitely mishandled the investigation and the lab tests, Amir is free to ask to complete or re-due those tests. Yet all he does is point to the  void, and claims its theoretical filling would have exonerated his client. This is how things end for all those tests, except in one case. In Herman’s redirect testimony, the prosecution asks a few more questions about the bloodless bag, when suddenly the Judge’s curiosity over takes him:



  • Judge Taperberg: tell me, if there was blood, how can we tell even though we can’t see it?
  • Herman: if you’d ask me today, than we have tests for hidden blood. Biochemical tests and immunological tests.
  • Judge Taperberg: I’d like it done.
  • Tzion Amir: what done?
  • Judge Taperberg: the tests on the bag. to see if there’s still blood on it.
  • Tzion Amir: your honor is saying? your honor wants?
  • Judge Taperberg: yes. DECISION: the court is instructing the lab to perform a chemical blood test.
  • Tzion Amir: your honor, if i may, your authority. Our opinion wasn’t asked in the matter, but your honor should state what authority grants him,
  • Judge Taperberg: the authority to seek the truth, which you so heatedly support.
  • Tzion Amir: no, but your honor should state in his decision from where he derives the authority to instruct such a decision [to test the bag].
  • Judge Taperberg: as requested by the defense. now, during the expert testimony, a question arose in the court and doubt, as to the inability to see blood on the bag, if as claimed, the victim was wearing the bag when he was shot. In order to discover the truth and complete the missing information, the court here by instructs to conduct the aforementioned test.


Notice Amir’s reaction, who all of the sudden is not thrilled to perform the test, which only moments ago he claimed would vindicate his client. “by what authority?” Amir asks the judge. “the authority to seek the truth, which you so heatedly support”, Judge Taperberg snipes back sarcastically, making it clear he, like you now, is aware of the distance between Amir’s verbal cries for the truth lost with the missing tests, and the way he actively pushes to suppress that truth, when retesting is available.

A month later Herman returns to court with the results: Blood. Blood on the bag, inside the bag, and all around the entry hole left by the bullet.

התיק עם הדם.jpg

Nawara’s bag before the endless delaying of the trial removed all visually traceable stains of blood

As a bullet passes through the body, it carves and cuts its way through the flesh and organs, leaving a Permanent tunnel or cavity. It also produces short term damage – tissues and organs which are blown by the shock waves (AKA Hydrostatic shock\pressure waves), but then mostly return to their original placement.

cavity.jpg

On June 16th 2016, Dr. Chen Kugel, the chief Pathologist in Israel’s national institute of forensic medicine,  testified that the permanent cavity – the “tunnel” left in the body by the bullet – is not what he’d expect to find and he cannot explain it. The media silence about the case was broken the next day, as Kugel’s testimony became this headline:

%d7%9b%d7%95%d7%aa%d7%a8%d7%aa-%d7%9e%d7%95%d7%95%d7%90%d7%9c%d7%94-%d7%9c%d7%a2%d7%93%d7%95%d7%aa%d7%95-%d7%a9%d7%9c-%d7%a7%d7%95%d7%92%d7%9c



Translation:
“No explanation for the direction of the bullet”: A turn in the case of the border police officer accused of killing a Palestinian.

The head of the national institute of forensic medicine testified in the trial of warrior Ben Deri, accused of killing a Palestinian boy during a disruptive protest in Beitunia. According to him, the locations of the wounds on Nadeem Nawara’s body, aren’t consistent with the location of the accused at the time he fired.



In order to understand Dr. Kugel’s testimony, i will first need to anguish you through some basic knowledge in Ballistics, internal ballistics and other terms and fields relating to the movement of a projectile through the human body.

The Problem:

At the time of the shooting, Deri is on an elevated platform, referred to as “The Balcony”, which is about 5 meters above Nawara. From Nawara’s perspective, Deri is in front and above him. So a bullet fired by Deri at Nawara, should move down between the entry wound in his chest and the exit wound in his back.

The permanent cavity left by the bullet, is indeed a downwards movement with an insignificant 3cm to the side. Only the downwards movement is significantly sharper that Deri’s angle as he was firing. Dr. Kugel would expect to see such a permanent cavity from the same general horizontal location Deri was in, but from much higher.

%d7%aa%d7%a6%d7%90-%d7%a9%d7%9c-%d7%96%d7%95%d7%99%d7%95%d7%aa-%d7%94%d7%99%d7%a8%d7%99

Aerial photo of the location showing the line of fire between Deri and the balcony (on top) and Nawara (on the bottom).

This, as the headline claimed, really is a dramatic turn: the shot couldn’t have come from Deri’s location. But whoever leaked\reported the testimony, did so only partially, and left out the cross-examination:

The prosecution asks Dr. Kugel if one’s posture would effect the cavity, and Kugel confirms. Kugel is asked if Nawara’s walk, which is a little bent over, could effect the cavity, and he confirms. Kugel is asked if the weight of the bag pulling back, when we know that we unconsciously auto-correct this by leaning forward – would that affect the canal, and he confirms. Finally, Kugel is asked weather these elements combined could create the permanent cavity he saw in the body, and he answers that it is possible.

Now some of you might think, as Amir yelled in the court, that Nawara isn’t that crouched over. He is leaning forward, but could that really explain a drop of 11cm (4.3in) in height from the entry wound to the exit wound?

The prosecution stops here. Though Kugel’s testimony now allows for Deri to be the shooter, it still deems it unlikely. This is a hard blow to the case, which we shall try to fix now.

The Natural Loss of Altitude:

First we need to calculate whats the drop in altitude we would expect from a bullet passing in the air, over roughly 25cm (an average distance between a thin-muscular man’s chest and back)?

So we know Deri is 5m elevated from Nawara and is 80m away. A simple Pythagoras calculation will tell us that the angle of the shot was 4 degrees (the rifle was slightly pointing down), as was testified by the IDF’s expert.

angle

So how much altitude is lost at 4 degrees over 25 cm? Pythagoras will again tell us that we should expect 2cm drop, and not the 11cm that was found in the body. So we have 9 extra centimeters, which do not align with the angle between Deri and Nawara.

man-profile

Black triangle: The angle between Deri & Nawara and the altitude drop Kugel expected to find. Red triangle: The angle & altitude drop found in Nawara’s body

It should be stated that the location of the wounds, is relative to the spine on the back the chest bones in the front. as they are not on the same surface, there can be a 1-2cm miscalculation. But still, as Kugel stated, 7-9cm is still a lot.

Proof by contradiction:

Will begin by assuming Dr. Kugel is right, and that the angle between the entry and exit wounds, is the angle between the shooter and Nawara (or somewhat close to it). We go back to Pythagoras and calculate that the 11cm drop, over 25cm~ distance (through the body), gives us an angle of ~24 degrees.

As found by the IDF’s expert, the structure on the right of Nawara blocked any fire coming from that direction. We know from the wounds the shooter couldn’t have been behind Nawara and to the left of Nawara its all flat (which obviously doesn’t work with an angle of 24 degrees). so the only area a sniper could have been elevated and still been able to see Nawara was the balcony Deri was on and the buildings behind it.

%d7%94%d7%91%d7%a0%d7%99%d7%99%d7%a0%d7%99%d7%9d-%d7%9e%d7%90%d7%97%d7%95%d7%a8%d7%99-%d7%93%d7%a8%d7%99

We know from IDF’s report on possible lines of fire, that everything to the right of the red line in the picture above, has no view of Nawara. The black circle is where Deri and his force were.

So we can see, the only other possibility for an elevated “incriminating sniper”, is the building behind Deri, in the parts left from the red line. The building behind Deri is about 10m back, which means 90m from Nawara. Back to Pythagoras: 90m at 24 degrees, means the shooter was 40m in the air.

The building behind Deri has 3 floors and another one if you include the narrow section with the red roof tiles. So 4 floors all together, making the red roof the highest location “the incriminating sniper” could have been at.

Israeli standard for floor-ceiling height is 3m but to avoid arguing about the subject, we’ll assume 4m. And so: 4 floors X 4 meters + 5m which is the height of the balcony = 21m . When according to Dr. Kugel, the sniper should have been 40m in the air – twice as high. Not just an invisible sniper, but a flying one too!

So how can all this make sense? The answer, in my opinion, is that Dr. Kugel is wrong.

Introduction to Forensic Ballistics:

When Kugel is asked if the bullets trajectory in the body could be influenced by the bullets movement in the air, he answers dismissively: “I don’t think its because the bullet made any stunts in the air”. But it did. All bullets do.

We tend to think of bullets in flight, as facing forward, with their tip\nose directly facing the target. We’ve learned from forensics shows on TV, that you can stretch lines from wounds on a body, and arrive at the exact location of the shooter. All these things, in most cases, range from exaggeration to complete nonsense.

A combination of different forces cause bullets to move in different ways:

  • They obviously travel in the direction you aimed (normal ballistic trajectory)
  • Circular Grooves in the barrel cause the bullet to spin (which keeps it balanced)
  • The friction with the air causes the bullet to be a bit “snobbish” and raise its nose a little, creating an angle of attack (the angle between the direction the bullet is moving towards and the direction his nose is facing).

In simple words, the bullet takes time to stabilize and it leaves the barrel somewhat shaky. This shaking of the bullet’s nose, which creates different angles of attack, is called “Yaw”. Generally speaking, a longer barrel produces a steadier bullet, and Deri’s gun was an M4, which is Basically a shortened M16 (meaning more “Yaw” and more shaking).

Image result for bullet yaw

I’m telling you all of this because the way and the angle a bullet hits the body, is critical to the trajectory it will take inside the body, and the permanent cavity it will leave behind. So while we think bullets hit their target like this:

shadowgraph straight.jpg

In most cases they’ll hit it like this:

shadowgraph yaw.jpg

The arrows represent the counter force acting on the bullet from the friction of the body or matter it passes through. When a bullet is perfectly aligned, then the friction forces acting on him are symmetrical, It slows down, but it does so without changing its path from the trajectory it had in the air. But when the bullet has an angle of attack, the friction acts more on one side of the bullet, than the other. this can be seen easily in wind tunnel testing of air craft wings:

wind aroud wing.jpg

Because the wing is tilted down, there’s a lot of air friction beneath it but non above it. The same thing happens to a bullet.

This is the stability graph for the bullet Deri was using – a 5.56mm M-193 FMJ:

יציבות קליע לפי טווח.png

Without going into specifics, the bullet starts with 3 degrees of Yaw and only stabilizes after 200m (The graph is for a longer barrel, so Deri’s bullet would have been even shakier). Nawara was 80m from Deri, so we  know that the bullet most likely hit him with an angle of attack ranging from 0.8 to 2 degrees, and that the Yaw forces were still active at impact (the nose was still moving around).

shadowgraph yaw.jpg

And when a bullet hits the body at an angle, the friction causes it to tilt towards that angle and the center of gravity of the bullet (marked by the red dot) “tries” to move forward. The more the bullet continues to travel in this manner and the slower it gets, so would the angle of attack increase. What starts off as just a degree or two, quickly turns to sharp angles and sometimes even spinning of the nose and tail (AKA “tumbling”). This explanation is missing from Dr. Kugel testimony: the M-193 trajectory inside the body, is rarely a continuation of its trajectory prior to entering the body.

But how dramatic this effect can be? am i not just bothering you with insignificant details?

Since the M-193 is an unstable bullet with a rear center of gravity, many times, inside the body, it will start to turn towards a complete reversal, which is known as Tumbling:

But just as many times, the bullet’s Yaw will create an angle of attack, but not one sufficient for full tumbling. In those cases, research has found that after 9-16cm of penetration, the bullet will start wandering off its flight trajectory (your welcome to read these 2 pages , but feel free to skip):

So roughly 10-15cm in to the body, a “cone of possibilities” opens, for possible paths the bullet might take.

cone-of-possibilities

But does this “wandering around” characteristic of the M-193 explains the 7-9cm altitude drop between the entry and exit wounds in Nawara’s body?

Watch this testing of an M-193 fired into ballistic gel (a gel with the same average density as human tissue and organs). The block of gel is about 28cm long, which is about the same as a thin-muscular male’s chest. Watch where the bullet hits, how straight its trajectory is in the beginning, how it turns, and where it ends up:

A screen capture of the result :

m193-55gr-fmj-5-56mm-vs-ballistic-gelatin

The bullet penetrates about 8-9cm deep, maintaining its ballistic trajectory prior to hitting the gel. It then turns and takes a dive downwards (basically takes a single option out of the cone of possibilities), until it leaves the gel – roughly 10cm below the entry point!

Kugel Vs. Eishton:

So you can see that the M-193 isn’t loyal to the ballistic trajectory, and its wandering can explain 7-9cm in altitude drop in Nawara’s wounds. In his response to this investigation, Dr. Kugel explained that though he agrees with what you’ve seen thus far, the permanent cavity found in Nawara’s body, was quite straight and didn’t present a hard turn as depicted above.

I myself obviously didn’t gain access to the body or the autopsy’s photos, so i must rely on Kugel’s testimony of it (and he seems to be a very honest person). That said, i am not as certain as he is, as to the accuracy of measuring a permanent cavity which runs through multiple moving organs, in a body that was in motion when it was hit, and in a partially rotten corpse, one month after it was buried. Kugel himself, after reading this investigation, understands that there are paradoxes within his conclusions:

if the bullet tunnel in the body is completely straight, it means the friction on the bullet was symmetrical and only acted on the bullet’s nose. Which means there shouldn’t have been any fragments (M193 bullets do not break or get squashed without hitting bone, if they don’t tumble or turn). As such, we began – Kugel and I – searching in forensic ballistics’ experimentation and research, to find a possible explanation.

At first, i was able to find the following test of an M-193 fired into a ballistic gel, which still shows a 10cm altitude drop, but without the sharp turn (just a gentle arc, which is so gentle as to be confused in a partially rotten body with a straight line):

Though this (and many other recordings of the same phenomena) got us passed the “sharp turn” issue,  Kugel replied that the permanent cavity in Nawara’s body didn’t show the severe damage and tearing, that is caused by the shock waves and expansion you see in the video (the growing “bubble” inside the gel, known as Hydrostatic pressure waves).

So i kept on reading, until i came across a study conducted in Iraq in 2010, which examined the bodies of 30 people killed by high velocity bullets (such as the M-193). That study sent me to another book in the field, which explains that the hydrostatic pressure waves which should have created the damage around the permanent cavity in Nawara’s body, mostly occur when the bullets move through the body at speeds greater than 2500fps.

There is some debate regarding the hydrostatic threshold. It changes with different guns, bullets, angles and conditions. But generally speaking, most estimates place it around this number, for the combination of Deri’s rifle and bullet (M4 firing an M193). For our purpose, suffice to say that if the bullet hit Nawara at a velocity lower than 2500fps,  than it’s likely that no hydrostatic shock occurred and therefore, Dr. Kugel wouldn’t find the injuries associated with it.

As mentioned, Deri was using an M4 rifle, which has a muzzle velocity – the speed at which the bullet exits the rifle – of ~2900fps. Again, every change in the gun, humidity, elevation, and quality and maker of the bullet, will give you different results. But at 80m – the distance between Nawara and Deri – the spectrum is from 2200 to 2700fps (from worst to optimal conditions).

So we can clearly see that Nawara was very likely to have been hit under 2500fps, and thus it’s very likely he didn’t suffer any hydrostatic shock damage. On top of that, further reading taught me that most bodily tissue and organs, are too elastic to be damaged by the hydrostatic shock. The brain, enclosed in the skull, blows up like a tiny bomb set off in a closed bottle of water. The liver has enough plasticity, so that the stretching shreds it beyond repair. But other organs, though they might suffer from the shock, don’t tear and leave evidence of it. So even if there was some shock at entrance, it is possible that by the time the bullet reached Nawara’s liver, it had slowed below 2500fps, and thus, left no significant damage for Kugel to find.

thr-abcs-of-reloading-page-143-hydrostatic-shock-in-elastic-tissue

Kugel Response:

Presented with these findings, Dr Kugel accepted them as a possible explanation for the wounds found in Nawara, though still defending his testimony in court, that it’s unlikely. This change though, happened a day after the plea deal was signed.

I asked Kugel weather he changes unlikely options, when he’s made aware of the incident’s circumstances. For example, he sees a wound which 95% of the time, would indicate it was caused by a serrated knife. But this time he has video of the attack, and the knife retrieved from the body – which had a smooth blade. Surely he wouldn’t testify in such a case, that the weapon found is very unlikely to be origin of the wound. Kugel agreed that the correct testimony in such an incident, would be to indicate that if the evidence regarding what happened outside the body is confirmed, than a 5% reason, becomes a 100% fitting explanation.

Kugel still maintained his testimony wasn’t that important and wasn’t the main cause for the deal signing, rationalizing that the deal confirms Deri as the shooter even though his testimony concluded this is very unlikely. But i believe Kugel’s testimony put pressure on the already willing to settle prosecution. An alibi testimony saying an accused wasn’t in the crime scene, could create sufficient pressure or excuse to sign a deal which states he was. Deals are signed because of evidence, but not necessarily with accordance to them.

Once the deal was signed, confirming Deri as the shooter, i asked Kugel how he reasons this with his contradicting testimony. he replied:

“Deri probably shot the bullet which killed Nawara. How this happened? I’m not sure. But i live with many things which i cannot explain, and I’m aware that i can’t explain everything and not everything is known to us”.

I asked did he not think that this should have been mentioned to the judge (for whom this is his first criminal case) and the prosecutors? Isn’t it important to know that the understanding of pathology is not yet perfect (like most forensic fields)? That an unexplained cavity doesn’t actually mean an impossible one and that it’s happened to him before that he couldn’t explain a wound, though he knew from other facts exactly how it was made? Doesn’t he find the difference from this explanation (which we discussed in our emails), to the one he gave in court (“I can’t explain this angle in the body”) to be important? Not only for this case, but for the judge’s next cases, in which he might rule based on “a fact” which isn’t one at all?

In conclusion:

Here the correspondence ended (I’ll update if Kugel replies). In conclusion we can summarize that the bullet cavity found in Nawara’s body could have derived from Deri’s location (according to science), is a less likely possibility for a shot from Deri’s location (according to Kugel), and is definitely the cavity created from the shot Deri made from his location (according to all the other evidence, the video and Deri’s own confession in the plea deal).

A second problem Kugel described in his testimony, was that he couldn’t explain the shape of the bullet found in Nawara’s bag. The bullet remained rather intact, with some unsymmetrical squashing in its tale.

This slideshow requires JavaScript.

Deri’s Lawyer asks Dr. Kugel about the condition of the bullet, with regards to the fact that it didn’t hit any bones in its path. Kugel replies:

“We don’t see a reason for the bullet’s squashed condition. From its path in the body i can’t explain its condition”

In Reality:

Here Dr. Kugel steps outside is realm of expertise. Bullets routinely break and are squashed without hitting bones, just  from the forces acting on them. Here’s a picture of the famous fragmentation tests, conducted by Martin Fackler, on the M193 bullet, in Various striking velocities:

fackler-large

Displaying image.png

As you can see, there’s a whole spectrum of possibilities for end condition of the bullet. Our bullet is bent\squashed in its tale, but not broken. This correlates with the result on the left of the 2nd row from the bottom. As you can see by the striking velocity – 2395fps – this not only fits with the condition of the bullet found, but also the velocity expected at 80m distance (which we covered in the previous section). This in turn, also matches the science in the field which says hydrostatic-shock damage is likely not appear in this velocity (and it hasn’t). So you can see how the evidence don’t contradict, as Kugel testified, but actually  complement each other. Here are some more M193 bullets, shot in to ballistic gel, which ended up intact and only squashed non-symmetrically in their rear:

m193-sqaushed-in-the-rear
m193-sqaushed-in-the-rear2
m193-sqaushed-in-the-rear3

And here again is the bullet found in Nawara’s bag (you can clearly see this result isn’t “unexplainable”, but standard at the right velocity and recurring):

nadeem-bullet-from-docu

Non-Jacketed Fragments:

Another support for the fact that the condition of the bullet found matches the trajectory in Nawara’s body, is the content of the fragments retrieved from the body. Those were tested to check if their composition is the same as the bullet found in Nawara’s bag (and it was).

Image result for bullet jacket

M193 sliced to reveal copper jacket and lead interior

As a side note, the lab report also found that the fragments contained lead and small amounts of other impurities, but no Copper or Zinc from the bullet’s jacket (see image to the right). The head of the forensics lab in the Israeli police, testified that “the bullet was a little squashed in the back, and the lead inside it was squeezed out, like squeezing the toothpaste out of the tube”.

When an M193 bullet tumbles inside the body, it tears apart to fragments – both the Jacket and the Lead interior. But when the velocity and angle are below the fragmentation threshold, which is about 2500fps for the M193, the bullet can still bend and get squashed, but the forces are insufficient for complete tearing of the bullet (proving again that their shouldn’t have been any hydrostatic shock, since the speed needed for the shock, is roughly the same as needed for the fragmentation – and neither occurred).

5.56-Fackler-Bullet-Fragmentation-vs-Velocity.jpg

The reason the M193’s lead core can get squeezed out like toothpaste, is because of the bottom of its jacket, or rather the lack thereof:

M193 imi bottom.png

As the friction in the body acts on one side of the bullet (because of its angle), the Jacket is bent, but remains intact. The lead inside is compressed and squashed out of the M193’s open bottom.

M193 bootm to angle to curve to squeezed lead.jpg

Conclusion:

So the non-Jacketed fragments found in Nawara’s body, match the bullet found in Nawara’s bag: not only in the composition of the lead, but also in the fact that the fragments were only from the lead interior, and the bullet found still had a complete jacket. This again shows the condition of the bullet isn’t unexplainable, as Dr. Kugel testified, but rather in complete alignment with the other facts of the case and the research in the field. Contrary to his testimony, bullets do bend and get squashed (leaving lead fragments behind them), without hitting bones. And now, after the deal, we can also add that Deri confessed to making that shot (though supposedly without knowledge of it being a live round), which again means that not only the facts contradict Kugel, but also the accused himself.

Kugel’s response:

“With regards to the bullet’s condition, I’m now not as firm on my stance as i was [prior to reading this article]”. I believe that you might be right, but i want to check the photographs in the case file before deciding”.

Kugel hasn’t returned to me on this subject after looking at the photos (though i believe it’s just from forgetfulness and not avoidance). But his answer, the evidence and the plea deal, speak for themselves.

So we’ve now finished going through most of the basic evidence and correcting Dr. Kugel critical testimony, which basically cleared Deri of the blame, by claiming his position didn’t match the bullet trajectory in the body, and that the condition of the bullet found in Nawara’s bag, can’t be explained from the path it took through his body.

In this section we will be going over the conspiracy theories raised by the defense, which claim Deri was framed by the Palestinians or his friends in the army. As crazy as some of them might seem to you, i assure that they don’t seem that way to most Israelis and they are explained in court, with a serious and straight face.

M16 Vs. AK-47

Deri’s lawyer finds many insignificant correlations and connections, which could imply the existence of a conspiracy. But really, non of them make sense or have real substance in them – none but one: The postmortem medical report for Nawara, notes that his wounds were caused by an M16 rifle, and not an Ak-47.

Only this diagnosis is impossible. The two rifles are too similar in the wounds they inflict, to decide which of them was the weapon used. This Pseudo-medicine conclusion, was written in order to point the finger at Israeli forces (which use M4 and M16) and not the Palestinian police (which use AK-47). Lets admit the obvious: this really doesn’t look good.

But the report wasn’t actually written by the Palestinian doctors. They were asked to write it by the Palestinian authorities. If you’d ask me, this is nothing more than a stupid propaganda attempt. They wanted to run out to the press with “evidence” of Israel’s blame. This all happened prior to the collection of the footage from the incident and even the knowledge of its existence. And when you think about it, lets say we accept it’s proof of a framing conspiracy, then why would you write a fake medical report  to prove the identity of the killer, when you already know you have the killer on tape?

But you may certainly interpret this differently (as the defense does). All i ask, as i asked before, is that you keep thinking: “Assuming this is true, does it align with the rest of the objective facts of the case? And if it is true, why did the defense settle for negligent homicide, which means Deri did kill Nawara (only by accident), and all these conspiracy theories are false?

A fake report – to the detriment of its own makers?!

In the same reports, that the defense claims are fake, there are pro-Israel mistakes, which the defense uses as an advantage: In the first report, Nawara is said to be suffering from two entry wounds – as if he was shot in the back and in the chest. Only Dr. Kugel explains in his testimony, that this is a common mistake in a preliminary visual scan (prior to surgery), and that he too sometimes confuses exit wounds as entry wounds at such early stages.

But if the event and reports are fake and meant to frame Deri, than why would it have a mistake deflecting blame from Israel and punching holes in Deri’s guilt? Why would a “cooked report” be undercooked?

These mistakes, which benefit a different side every time, point more to a general lack of professionalism in the Palestinian hospitals, rather than a complex and well-thought of conspiracy.

The flipped view:

Let us for a second, look at this incident from a Palestinian prospective. Lets assume  you’re a Palestinian watching the news, and you see the IDF spokesperson saying that a live bullet can’t be fired through the rubber bullet’s extension. After that, a whole bunch of Israeli politicians, media people and journalists, all say the same thing: A live bullet couldn’t have been fired through the extension. All the while, living for decades under the army’s occupation, you know this to be false.

Now, do we derive from all these experts, politicians and the army itself, stating a false claim which points the blame at the Palestinians, that there must be a conspiracy between these parties? Do we conclude from this single lie, that the IDF spokesperson, Yekutiel the weapon expert and Ben Deri, had all colluded to murder Nawara?

Of course not. This is insane. And that’s why, for the same reason, i think one should always have faith in the stupidity of unrightfully confident people, whose blind patriotism leads them to make false claims, which they think will serve their side. The Israelis who claimed Nawara couldn’t have been shot by the M16\M4 are the same as the Palestinians who claimed he couldn’t have been shot by the AK-47: They are patriotic idiots, unaccompanied or guided by a large conspiracy, who in the end and contrary to their objective, only hurt their nation’s credibility.

But aside from this explanation, we shall now go through all the conspiracy theories raised by the defense. If I’ll prove them false or below a reasonable doubt (as i believe i do), than a line in a medical report has no meaning, since the conspiracy interpreted from it, cannot be.

One of the defense’s claims, is that Deri only fired rubber bullets that day. Do we have evidence to the contrary?

Hearing Testimonies:

Under the occupation, the Palestinians have been hearing live and rubber bullets for decades. With time, like the soldiers who fire them, they learn to distinguish between the sound the two make. All the Palestinian witnesses from that day, claimed they heard 3-4 live shots (and the rest were rubber coated bullets).

Matching the bullet:

The bullet found in Nawara’s bag, was a match to Deri’s rifle barrel. This test isn’t 100% accurate and shouldn’t be thought of as a deterministic result to the level of DNA testing, but rather a positive reinforcement. That said, the likelihood of someone being at the right time and in the right place, having a gun barrel similar enough to confuse the lab, is very low. Not only is it unlikely, it also cannot be by design: No 3rd party could have known the interior of Deri’s rifle barrel, and then find or make a similar one. They would have to rely on a lot of luck.

Matching the Fragments:

The fragments of bullet found in Nawara’s body, matched the bullet found in his bag (which we already said, matched Deri’s rifle). This to isn’t a 100% accuracy test, but the likelihood that a bullet left fragments in Nawara’s body, that are compositionally similar enough to Deri’s bullet, are slim.

The bullet and fragments went through a very accurate test (Isotope analysis), to check if the metal composition in them, is the same.The lead inside the bullet, has small impurities from other metals. The test checks for the ratios between all these metals in the bullet and fragments. If the ratios are the same (as they were), it means the bullet and the fragments are indistinguishable.

A Similar Bullet:

Deri’s defense asks Nadav Levin, head of Israel’s police forensics lab, if the bullet couldn’t have derived from the same maker and the same batch of bullets? The defense basically tries to detach the bullet – which matched Deri’s rifle – from the fragments. Maybe the bullet is Deri’s, but the fragments belong to a similar bullet, fired by someone else – perhaps someone from Deri’s force. Levin is asked if maybe Deri’s friends had such similar bullets, and had he tested them, they too would match:



Levin: No, Not at all
Deri’s lawyer: Explain
Levin: Because it’s a result of the manufacturing method. The method they use is such that the projectile’s cores [the lead interior of the bullet] is mixed with batches from many different Lead sources. and so, in the same batch of ammunition, i can find large variations in composition, but within a single bullet, i expect to find the exact same composition [as found in the fragments], which is what we found here.



What Levin is explaining is that even within a series of bullets that left the factory at the same time or arrived in the same box, there is great variation in the metal composition of their lead cores. It isn’t absolute variation: he expects there to be dozens or even hundreds of internal sub-groups, which are sufficiently similar to be tested as indistinguishable from each other. But this still means that the likelihood of someone in Deri’s force having a similar bullet, is in the single digit percentage or even less.

This again, is one of those instances were Deri’s Lawyer would like you to think no further. Here… We have a chance that the bullet isn’t Deri’s. that chance might even be 5%, which is the acceptable legal standard for reasonable doubt. So should we acquit Deri?

But doubt doesn’t accumulates. We again need to ask: assuming this is true, how does it align with the rest of the facts?

If we agree that the bullet derived from Deri’s force, we also agree that Nawara was shot and killed by them. But then, we already have the footage of the shot that killed Nawara, and it syncs with Deri’s shot. What is the other option? That Nawara faked his fall and death by Deri, and then later returned and was really shot by someone else from Deri’s force, who against all odds had a bullet with the same composition as Deri’s?!? And even if that was true, than where is the footage of this second shot at Nawara?!

The Bullet’s Jacket:

As we discussed, The fragments not only matched the bullet by the lead composition, but also by the lack of Cooper and Zinc from the bullet’s Jacket. If the shot came from another shooter, even with a similar bullet,they couldn’t have known or control the result of their shot to match it with Deri’s found bullet (meaning: Jacket intact and lead squeezed out).

The Empty Case Ejection:

As I showed in my first investigation of the incident, zooming on Deri in the CNN footage, shows and ejection of the bullet’s empty case.

GP90.jpg

Right-Left: Complete bullet, empty case, Bullet’s projectile

This is critical because of the mechanism behind the automatic ejection of the empty case:

As you just saw, the force from the explosion of the gun powder in the bullet, pushes the projectile down the barrel of the gun. The same gases, are also partially channeled backwards, to push the mechanism back, and eject the empty case.

The only problem is, that this only happens because the projectile blocks the gases (it is 1mm smaller than the barrel), so that the gases are forced upwards and backwards, to release the empty case. When shooting rubber coated “bullets” (actually 3 metal cylinders covered in rubber and wrapped in nylon – Army nickname: Tampon), this doesn’t happen.

טמפון תחמיש ורומה - english.jpg

The “tampon” is inserted into the extension from the front (left side in the picture). A blank bullet, which has no projectile, is fired. The gases go up the barrel, into the extension, and propel the Tampon at the target. Since there’s no projectile to block the gases, very little of them go up and backwards (because physics dictates they shall always aspire to continue in the same direction, unless forced otherwise), And the empty case isn’t released automatically.

Enlarge the video if you need, but you can see the empty case ejected after the shot – which doesn’t happen when firing rubber coated bullets.

זום על התרמיל

Sonography of the shot:

In my first investigation i also explained that you could test the audio from the recordings of the shots, to see if they are live rounds or rubber bullets. This was possible, because we knew that the second shooter, who fired seconds after Deri, did fire a rubber bullet. Since the same camera captured both of them from the same location, firing the same gun with the same rubber bullet extension, than the sound of the two can be compared to see if they are the same.

Unfortunately this was beyond my modest means. But later Nawara’s family with the help of a human rights group (DCI) asked a UK forensics company to do just that. Here are the results (Full textual explanation can be found here):

In Conclusion:

  • All the witnesses claim they heard live fire
  • The projectile found matches Deri’s rifle
  • The fragments found match the bullet. Chances of matching a random bullet: slim to none. Chances of matching with someone from Deri’s force: single digit at best. But if the shot came from Deri’s force, than we have that shot on tape, and the shooter which syncs to that shot, is Deri.
  • The video shows an empty case automatically ejecting, which only happens with live fire
  • The Sonography of the shots shows Deri’s shot was live fire
  • As such, the only possible and reasonable conclusion, is that the bullet Deri fired at Nawara, was a live bullet.

The defense also claimed that Deri can’t be the shooter, since he couldn’t see Nawara. Maybe he fired a live round and maybe he didn’t – but the round didn’t hit Nawara, as Deri couldn’t see him.

Proof by contradiction:

If there’s no line of fire, than what the hell is he shooting at? Even Deri claims he was shooting at Nawara (though alleging it was only rubber), so how can he claim to have shot at him, while at the same time claiming he couldn’t have shot at him? And if there’s no line of fire, why is Deri and all the soldiers with him, are shooting from that location throughout that day?

Re-positioning by the Palestinians:

The Palestinians themselves took pictures from Deri’s position, looking at Nawara’s position, substituting Nawara and the other victims with stand-ins. Deri’s location (top picture) is next to the tree with the red flowers (you can see that in the CNN footage), and his view is seen in the red square (and enlarged in the bottom picture).

wwwwww2.jpg

Lieutenant colonel Naftaly’s report:

lieutenant colonel Guy Naftaly, a visual analysis expert in the IDF for the past 25 years, was asked to check possible lines of fire towards Nawara’s location when he fell (seen on the security cameras). He concludes the obvious: there was a line of fire between Deri and Nawara:

%d7%aa%d7%a6%d7%90-%d7%a9%d7%9c-%d7%96%d7%95%d7%99%d7%95%d7%aa-%d7%94%d7%99%d7%a8%d7%99

Aerial photo of the area, showing the line of fire from Deri to Nawara (From Col. Naftaly’s report)

3D reconstruction:

The UK forensics company also tested lines of fire, by reconstructing the whole area in a 3d model:

In Conclusion:

  • If there wasn’t a line of fire, Deri and the rest of the soldiers were just shooting the whole day at thin air, with great aiming and concentration.
  • Palestinian reconstruction shows there was a line of fire
  • Col. Naftaly concluded there was a line of fire
  • 3D reconstruction concluded there was a line of fire
  • Put together, there is no other option but to conclude Deri did have a line of fire at Nawara

Another angle tested by the defense, claims that maybe Deri had a line of fire in principal, but at the time Nawara was shot, it was blocked by the parking tractor or some passing truck?

By contradiction:

Again… if the line of fire was blocked, why are they shooting? Just sniping at a parked tractor for fun?!

Camera 8:

The carpentry business to the right of Nawara, had 8 security cameras. Since nothing interesting is shown on the other 6, no one cared to look at them. But camera 8 is just on the corner of the building, facing the balcony that Deri and his friends were stationed on (Meaning it’s almost identical to the line of fire and to the view Nawara had of Deri).

According to the time-code on cameras 1 and 2 (which captured Nawara’s fall), he was shot at 13:45:10. Here is a screen shot of the exact same moment on Cam8:

%d7%9e%d7%a6%d7%9c%d7%9e%d7%94-8-%d7%91%d7%a2%d7%aa-%d7%94%d7%99%d7%a8%d7%99

I marked Deri’s location with the red circle, and you can clearly see there’s no truck passing and the tractor tall enough to obstruct Deri’s view, is at least 5m to the right of the line of fire.

Though the time-code between the cameras has been proven to be in sync, those of you who are worried it isn’t can read the following syncing explanation (the rest can skip past the next video):
On Cam8, you can see a soldier moving from the right of the balcony to the left (towards Deri), and you can see the same soldier in the CNN footage (only from their angle he’s coming from behind Deri). Also, at 13:45:30 (20 seconds after the shot), you can see a gas grenade fired from the balcony. Looking through the low quality Cam2 at the same time, you can see that Nawara is being placed inside the ambulance. At that same moment, a 3rd camera man was taping the ambulance from the other side of the street, and you can see the gas grenade hit the road:

Reverse Angle:

This is a photo of the reverse angle (from above and to the left of Deri’s point of view) taken a few hours after the incident (Deri’s actual position is further to the right of the soldiers you see on the balcony):

מעל המרפסת 2 עם סימונים.jpg

Again, you can see the tractor (marked with a red arrow), is far to the left of the line of fire between Deri and Nawara, which fell a few meters to the left of the jeep in the red circle.

From Nawara’s perspective:

The next photo was capture just a second after Nawara fell. In the background you can clearly see that the only thing between Deri and Nawara, is the white van, which is to short to block the view. The tractors cannot be seen, because they are outside the line of fire.

רצפה פנים גלויות 4.jpg

In Conclusion:

  • If the line of fire was blocked by the tractor, Deri and the rest of the soldiers were just shooting the whole day, with great aiming and concentration, at a parking tractor.
  • Cam8, which syncs with all the other cameras, show no obstruction in Deri’s line of fire, and so does the reverse photo from behind Deri’s location
  • The photo of Nawara on the ground, also shows no obstruction between Deri and Nawara
  • Conclusion: There was a line of fire between Deri and Nawara – throughout the day and also specifically at 13:45:10.

Another of the defense conspiracy theories, is that the person seen falling in the video, isn’t Nawara. This claim is based on the fact that at the time he was shot, Nawara’s face was covered. A second fact supporting this claim, is that Nawara was left handed, and the person claimed to be Nawara, is seen at one of the times he is throwing stones, throwing a stone with his right hand.

I haven’t seen the footage myself (just read of it in the trial’s protocols), but if it’s one time out of all the rest, than this doesn’t have much meaning. Perhaps he just did it once. Perhaps his left arm was hurting from previous throws. I can’t say. In the footage I’ve seen, he is throwing with his left hand. Anyway, we’ll deal with the identification problem, in better and more reliable ways.

%d7%9e%d7%99%d7%95%d7%9d-%d7%94%d7%94%d7%a4%d7%92%d7%94-%d7%aa%d7%9e%d7%95%d7%a0%d7%94-%d7%91%d7%a8%d7%95%d7%a8%d7%94-%d7%a9%d7%9c%d7%95-%d7%9e%d7%9b%d7%95%d7%a1%d7%94-%d7%a4%d7%a0%d7%99%d7%9d

Nawara in the protest that day, holding a stone with his left hand

The identification oversight:

Another example of negligence by the prosecution, can be found in their failure to properly identify Nawara in the footage. They did have Nawara’s father, Siam, identify his son, but only in the security footage. The defense, in its cross examination, got Siam to admit the obvious: He identified his son in the security camera footage, only by the way he walks and the clothes he’s wearing. Not a facial identification (which cannot be done with that footage).

Identification by clothing:

You can See Nawara’s clothing from that day, in the picture above (and more further down). I’ll show you one photo from his past, showing him with the same Keffiyeh and bag, but there’s endless video and footage of him from the months prior, Wearing the same clothes:

with-bag-and-clothing-before-incident

Facial Identification:

Aside from the security cameras, we have other photos from the event, which clearly show Nawara’s face (and they all sync with the security cameras):

This slideshow requires JavaScript.

And here’s a video zooming to make it clearer:

The prosecution did introduce the footage I’ve shown you into evidence, but there’s a legal distinction between “here are photos showing Nawara” and “Sir, do you recognize your son in this photo?”. Its technical, but necessary. So let us, again, mention the obvious: Siam and the rest of Nadeem’s family, identify him in the footage from that day.

In Conclusion:

  • all the witnesses who knew Nawara, testify he was there and he is the person collapsing in the footage
  • The clothing match
  • The still photos clearly show his face and his family and friends identify him in those photos
  • Conclusion: Nawara is the character in the security camera’s footage

This one is simple by now, because as we’ve already seen and proven Nawara was alive  during the protest, as documented by video and photos, and testified by the people there who knew him.

In another of the prosecution’s failures, the samples taken from Nawara’s body failed to produce DNA, and the prosecution didn’t ask to retake samples in order to validate the identity of the body (which was already partially decomposed). Even if the prosecution didn’t want to put the family through a second grave opening, it could have at least tested Nawara’s little brother, in order to eliminate him as the source of the DNA found on the bloody bag (which the test found originated from a male offspring of Nawara’s parents). The prosecution could have also asked to test a hair brush of Nawara’s or something he left that might have his DNA on it.

None of this was done (the family wasn’t even aware that the identification failed until i told them). I’m not saying the prosecution tried to fail, but it sure succeeded in doing so. As a result, the defense claimed that the body from the autopsy isn’t Nawara’s at all. So Lets prove Nawara did die.

Documentation:

  • We have photos and movies of the bodies, but it’s up to you if you want to check them or just believe me (be aware the images are graphic). Nawara’s body can easily be identified as you can see his face and also the scar on his chin (i added a picture from his past for comparison):
  • Videos from the funeral: 1,2,3,4,5,6,7
  • For photos after the bodies were cleaned and dressed, click here.

So we’ve got plenty of documentation of the bodies. But, obviously, the defense claims those might be fake (though if it is, it is beyond Hollywood level). But we also have hundreds and even thousands of people who saw and even touched the bodies. But here again, we return to Israel’s belief in a vast national-effort Pallywood, not only made up of the hundreds involved in the “fake shooting”, but thousands more in the “fake funeral”.

The “Legitimate” Witnesses:

Since Israelis don’t believe Palestinians and since the prosecution didn’t care to do it, i went and looked for Israeli-Jews who saw the bodies. Finally i came across two photo journalists who were in the morgue with Nawara’s body:

This slideshow requires JavaScript.

First, before we start another conspiracy theory going: no… the dead don’t always close their eyes, and when they don’t it’s very hard to force it (37% remain with eyes open).

Aside from their photos (above) I also asked to interview them as eyewitnesses to Nawara’s lifeless corpse:

  • Yotam Ronen is an independent photographer who publishes with Walla! and Activestills. Mentioning the obvious: He is an Israeli Jew. Yotam arrived at the morgue the day after the shootings. He testifies  that as a photographer in Palestine and Israel he’s seen dozens of bodies, and while he isn’t a doctor, Nawara and Abu Daher were lifeless and didn’t move or breathe. Yotam was with the bodies in the small morgue for 4 minutes and in the funeral for 30.
  • The second photographer is a ‘Getty images’ worker, who preferred to remain anonymous. He too is an Israeli Jew, who spent 5-10 minutes with the bodies in morgue, and he too testifies they were dead.

In Conclusion:

  • We have the Palestinian’s death certificates
  • We have many videos and photos of the bodies
  • We have thousands of Palestinian witnesses
  • And for those who don’t believe Palestinians, we have two Jewish witnesses
  • As such, Nawara’s death is proven, by any sane standard

.

We have one Palestinian witness (the owner of the carpentry factory), who says the shot that killed Nawara, came from IDF soldiers, who were stationed that day on what is known as “The surface”. Could this be true?

Distances.jpg

Position and distances between Deri, the surface & Nawara

It’s almost impossible to locate the source of a shot based on sound. You might be able to say it came from the left or right, back or front, but actually differentiating between two close locations, is virtually impossible to do without the help of computers and microphones.

The factory owner was sitting on the balcony of his home, from which he couldn’t see Deri or his force. Blind to them, it’s likely that he naturally connected the sound with the visual information available to him, which was only the soldiers on the surface.

He also testified he thought Deri’s force and the protesters couldn’t even see each other. Since we know this to be wrong, it just further exemplifies how his field of view formed his erroneous conclusions. But Lets go beyond disproving his testimony and proving the shot didn’t come from the surface.

CNN’s Cameraman:

The Cameramen and photographers that day, located themselves outside of the crossfire of the stones and bullets. Below you can see CNN’s location and how close they were to the line of fire between the surface and Nawara. They stood there facing the balcony, because it was facing the action, while still being safe.

site-plan-figures.jpg

This is how CNN’s cameraman responded to the defense’s claim that the shots came from the surface:

 “I’ll tell you one thing, if that soldier was shooting at my direction i would have screamed at him, that’s what i would have done. I would have screamed “are you crazy? to shoot at us?”. I would have noticed if someone was shooting from there [the surface]. it’s flat”.

The stone throwers reaction:

Throughout that day, the stone thrower snever hide from the surface – only from the balcony. You can see it in all the footage: a shot is fired, they run to the wall of the carpentry factory (see picture below), which hides them from the balcony, but not the surface.

wwwwww2.jpg

Top: White arrow marks Deri’s location and the red frame his view of the dead and injured that day. Bottom: The same view enlarged. Left of them is the carpentry factory.

The Open-Fire instructions:

The soldiers on the surface were not given clearance to shoot at any time that day – live rounds or rubber. There is no testimony or evidence, in the IDF, the police or by the defense, that claims that any one approved fire or shot without approval.

Deri’s force on the other hand, were given instructions to use non-lethal fire (rubber coated cylinders, gas grenades and the sorts). Within an area of permitted fire, you might be able to conceal unpermitted fire  (for example: Deri’s force allowed an IDF photographer to snipe rubber coated cylinders at Palestinians for fun). But the soldiers on the surface, didn’t fire at all. If one of them had taken a shot, it would’ve been unconcealable. In order to conceal it after the fact, they would all have to back the shooter up, in an IDF conspiracy to to frame Deri (a fellow soldier) and help the Palestinians (which is obviously absurd).

Difficulty of the shot:

IDF’s expert testified that a shot from the surface would have been tricky: 250m (compared to Deri’s 80m), on the same level (compared to Deri’s 5m elevation), with obstacles in the middle (Utility poles obstructing the view). Not impossible, but difficult. Here’s a zooming from Nawara’s point of view, to the surface:

Syncing to Deri:

We have the CNN video, which shows Deri’s shot synced to Nawara’s fall. If a soldier from the surface took a shot at the same time, he’d have to somehow sync it to Deri as he pulled the trigger – something which cannot be done. Even if it happened by accident, The distance between Deri and the surface, and them being on different sides of the CNN camera, would have resulted with the sound of two different shots.

The Bullet:

If another soldier killed Nawara, then why does the bullet match Deri’s rifle? Though it’s a possibility that a similar enough rifle was used, but it cannot be planned in advance and must be based on luck alone. Who would take such a gamble?

The bullet’s cavity canal:

If the shot was made from the surface, than why does the cavity canal in Nawara’s body fit a shot from Deri’s location? Nawara was shot on the right side of his chest (i censored the open wound and stitches from the surgery, but you can see the entry point of the bullet):

%d7%a0%d7%95%d7%95%d7%90%d7%a8%d7%94-%d7%9e%d7%a6%d7%95%d7%a0%d7%96%d7%a8

Now look where Nawara is facing when he was shot:

%d7%94%d7%9b%d7%99%d7%95%d7%95%d7%9f-%d7%90%d7%9c%d7%99%d7%95-%d7%a4%d7%a0%d7%94-%d7%a0%d7%95%d7%95%d7%90%d7%a8%d7%94-%d7%91%d7%a8%d7%92%d7%a2-%d7%94%d7%a4%d7%92%d7%99%d7%a2%d7%94

A shot from the surface will arrive roughly from the direction of the red arrow, while Nawara is facing Deri (the black arrow).

Even if the supposed surface sniper made the shot, the angle would be sharp: the bullet would hit Nawara not perpendicularly (like from Deri’s location), but more in the area of 45 degrees, pointing at Nawara’s right shoulder.

3man english.jpg

Nawara’s bullet cavity canal, describes a shot from the front. We did learn that this bullet isn’t loyal to its ballistic trajectory, but it’s still loyal to the general direction of the momentum from that trajectory. You can think about it like a first time ice skater who’s pushed forward. He’ll make awkward motions that would move him a bit here and there, but still in the general direction in which he was pushed at (with the direction of the vector). The bullet’s bodily trajectory, will be limited to a cone of possibilities, which open from the ballistic trajectory and in its direction.

cone-of-possibilities

The turn that would be required from a bullet from the surface to fit the cavity is extremely unlikely. Not only is it unlikely, but the cavity shows no such turn.  Furthermore, the cavity indicates the shot came from above Nawara, and the surface has no elevation over Nawara’s location.

In Conclusion:

  • A shot from the surface is difficult to make, with 250m to Nawara and obstacles in its path.
  • except for one witness who couldn’t see Deri, every one else testifies all shots that day came from the balcony (Including the army and the police).
  • Concealing the shot from the surface would require syncing with Deri’s trigger pull, which is impossible.
  • If it was synced by luck, then because no other shots were made from the surface that day, the other soldiers on the surface would be aware of it. And so, it would require a conspiracy of soldiers against soldiers, for the benefit of their enemy.
  • The bullet found matched Deri’s rifle and is unlikely to match one of the other soldier’s rifles.
  • Deri’s shot syncs to Nawara’s fall.
  • The bullet’s permanent cavity fits a shot from Deri’s location and doesn’t fit a shot from the surface.
  • Put together, the likelihood of the shot originating from the surface is infinitesimal and doesn’t reach or even come close to reasonable doubt.

From previous sections, we already know that Deri fired a live round. We also know that the shot syncs with Nawara’s fall and that the cavity fits a shot from Deri’s general location. The fragments matched the bullet which matched Deri’s rifle.


Even if such an invisible-Palestinian-James-Bond-sniper existed, and even if by chance Deri missed his shot and the unknown sniper’s shot was silenced, we still couldn’t explain the matching of the fragments and bullet to Deri’s rifle.

Again, since the fragments & bullet match Deri’s rifle, it would require a Palestinian  “mission impossible” team, which collects bullets and bodies from Israeli shootings. Then a body swap is required and it has to be a shot Deri made in the recent past (otherwise the body would rot or show signs of preservation). Yet we know of no such shot made by Deri. The two shots Deri makes – the theoretical legal shot from Deri’s recent past and the rubber shot at Nawara – would have to be from roughly the same location in order for the wounds to match. The DNA testing needs to be sabotaged in some way (since the body doesn’t belong to the killed “actor”).

Since there’s no previous shot by Deri for a “body swap” or a “fragments implantation surgery”, and since even if there was it would be way beyond CIA or Mossad’s capabilities (let alone the barley functioning Palestinian authority), this obviously is impossible.

The Body in the autopsy wasn’t Nawara’s

Since the DNA testing of the body failed and the prosecution didn’t ask for a second test, the defense claims maybe the body isn’t Nawara’s at all and then all the evidence derived from it – mainly the bullet fragments – are irrelevant. What Identifies the body from the autopsy as Nawara?

The body and Nawara:

  • The wounds are in the same locations as Nawara’s wounds
  • The body is of a young male, with short dark hair, 169cm in height and weighed 50kg – all fits Nawara
  • The body had a surgical incision which was crudely stitched – 12cm horizontally and then 28cm vertically – all identical to Nawara’s body in the morgue:961085_10152354916571391_1265068530_n
  • Another incision on the right side of the body (not seen in the image above), which is done for inflating the lung, also match Nawara’s operation before he died
  • The shoes generally match (a timberland style brown boot).

The autopsy details were taken from the reports which, if you don’t believe me, you can read here (otherwise skip ahead):

Logic:

Why would they swap the bodies? We’ve established the person collapsing in the video is Nawara and that he definitely died. If it was “Pallywood” and he wasn’t really hit or was hit by a rubber bullet only, then the Palestinians killed him after the event and before the hospital. But why? He is the person they claimed that died, so why use another body? Now we return to the fragments problem (if Nawara wasn’t shot by a live round from Deri, the fragments would be missing or a mismatch for Deri’s bullet). But as we discussed before, this would require the “mission impossible” team finding another body from Deri’s near-past; a body which doesn’t exist.

The other option, contrary to all these insanely complex conspiracies, is that the person seen in the video shooting the person that is seen falling, shot him.

Surely Occam’s razor would slit these theories at their illogical throats, versus the simplicity of accepting the what is seen is what happened. But this isn’t only a case of choosing the simpler possibility, but rather the only one that is actually plausible.

As you’ve seen, the conspiracy theories acquitting Deri are so improbable, that even his supporters probably won’t buy in to them. Deri’s lawyer, Tzion Amir, is to smart not be aware of this. He raises these theories as a hail Mary and perhaps to squeeze a better deal (which he has), but you don’t rely on them actually being accepted by the court.

This is how we reached the plea deal that was signed a few days ago, convicting Deri only of negligent homicide and aggravated assault. The deal is based on a theory in which the live bullet fired by Deri, got there without his knowledge or intent. He should have checked his magazine, but he didn’t (hence the negligent) and accidentally killed Nawara, when all he wanted was to shot a rubber bullet.

We shall now test the feasibility of this the bullet mix-up theory. Note that according to this theory, all previous conspiracies are false and no doubt that you might found there, is valid here. In the mix-up theory, both sides agree that Deri did fire a live bullet, which did kill Nawara, as seen on the footage. The only thing in debate here, is Deri’s knowledge of the live bullet’s existence and the probability of such an occurrence.

Outside Deri’s mind:

Since we can’t access Deri’s thoughts and know his intent, we seemingly must arrive at a reasonable doubt, and only convict him in negligence, as the prosecution did in the plea deal. So how will i go inside Deri’s mind and prove murder or homicide? in two ways:

  • Proof by contradiction –
    Proving the mix-up is impossible or improbable beyond a reasonable doubt. If I’ll prove that, the only remaining option will be murder.
  • Proof of intent –
    circumstantial evidence which show malice and partial confessions (by accident and by advertising his pride in the killings)

Lets begin.

The sterile war room

The loading of the blank magazines used for launching the rubber coated cylinders, is done in the war room of the base, where no live ammunition is allowed (Live magazines are loaded in a completely different location). The Sergeant from Deri’s company in charge of loading the magazines, explained the process in his testimony:

  • Closed boxes arrive with the blank bullets to the war room and are store in a back room, which holds all the non-lethal weapons.
  • The sergeant currently in shift will take a box of blanks from the back room to his table in the war room, and load them into regular empty magazines which have been painted red to mark they’re for blank use only.
  • At the end of each magazine the sergeant looks inside it to see there’s no bullet tip (the projectile which the blanks don’t have).
  • When a fire-team or a squad needs equipment, the squad’s commander goes to the war room and signs off on what he needs. He is then suppose the inspect the magazines again, to see no live bullet somehow got inside one of them.

In theory and by the rules, the war room is supposed to be sterile of any live ammunition. But Deri’s lawyer quickly proves with photos from inside the war room, that this isn’t the case. Soldiers are seen entering the war room with their personal guns, and the magazines attached to them (loaded with live bullets). So does this mean that a bullet mix-up is possible?

The chain of  mix-ups

The Israeli press explained the plea deal to the public, as if one mistake is all that was required for the tragic unintended result. But is this true? What is the chain of mishaps required for the end result of this case? The war room isn’t sterile as it should be, but bullets don’t just fall out of magazines:

  • lets assume that one bullet did fall out or a soldier was playing with a live round in his hand, and it fell in the war room.
    • But the blanks are in back room.
  • So lets assume that the accidental fall of the bullet, happened during the loading of blanks into magazines.
    • But they’re still inside a box on the table.
  • So lets assume it fell from a magazine or a hand, directly into the box.
    • But then the sergeant would pick it up and notice it’s a live round.
  • So he missed it. It’s dull work, and he wasn’t paying attention.
    • But when he finishes loading the magazine, he looks inside to see if there a live bullet.
  • So he didn’t look or missed that too.
    • But the sergeant testified this never happens. Deri’s lawyer tries to lead him: “were all human. maybe the lighting was bad. maybe just once”. The sergeant answers decisively – no. It never happens.
  • But lets assume that it did.
    • Than the Squad’s commander should have seen the bullet when he checked.
  • So maybe he too didn’t look or missed it.

So as you see, a single mistake isn’t sufficient for the end result of killing Nawara with a live bullet. A whole chain of random mistakes has to occur. Each mistake is unlikely by itself, but as a combination which also requires a specific order and synchronization, it’s unheard of. The sergeant, who is a friend of Deri, testified there has never been such an incident. Trying to crack his confidence he was asked again, maybe it happened somewhere else or in the past. “No!”, he replied. Unheard of.

I can add that after a lot of research, i have found no previous example of such a chain of mistakes in the IDF or the Israeli police. If it happened, it wasn’t in the last 30 years or so (prior to digital documentation). And 30 years ago (even 20 years ago), the whole separation between live rounds and blanks didn’t exist. In fact, the whole extension for firing rubber coated cylinders was only developed in Israel in 1989, which means if a case cannot be found up until then (which it cannot), then there is no such previous case.

Источник: [https://torrent-igruha.org/3551-portal.html]

Lord of the Rings:Battle for Middle-Earth II-RELOADED

Wage war in the North and assume command of the most storied civilizations in all of Middle-earth history – the Elven and Dwarven armies – or fight on the side of Evil with heroes and creatures that have never been seen in The Lord of the Rings films. Defend or overtake never before seen lands such as Dol Guldur, The Misty Mountains, and Mirkwood as you unleash powerful new weapons and abilities – summon dragons, cause volcanoes to erupt, or bring down a cataclysmic lightning strike.

But beware, with greater power comes greater adversity. Your enemies, commanded by a powerful new AI system, possess a greater tactical edge and more powerful spells. Will your armies have the fortitude to persevere?

  • Command all the races of Middle-earth with 3 all new factions including Elves, Dwarves, and Goblins.
  • Win the war in the North single-player campaign with all-new story that takes you to places and battles of Middle-earth previously unseen.
  • Build your own landmark castle with fully customizable and upgradeable fortresses and walls
  • Create your own hero with all new customized RTS units that are your avatars in-game
  • Control battles with all-new enemy AI, melee combat, and flanking, adding unprecedented tactical fidelity
  • Master next-gen unit control with smart formations, battle lines, and planning mode
  • “Build anywhere” brings creativity and strategy to base building and battlefield dominance
  • Control the entire war with a high level “Risk” style meta-game on the Living World Map with all new strategic AI
  • Extend your battlefield with larger than life navy battles at sea

Minimum System Requirements

  • Processor: 1.6 Ghz equivalent or higher processor.
  • RAM: 256 MB
  • Video Memory: 64 MB GeForce3-class video card.
  • Only supplied on DVD?: Yes
  • Hard Drive Space: 5.5 GB
  • Operating System: Windows XP
  • DirectX Version: 9.0c

Recommended System Requirements

  • Processor: 3.0 Ghz Intel CPU or equivalent processor.
  • RAM: 1 GB
  • Video Memory: NVIDIA 6600 or 6800 Ultra or 7800 GT or GTX.

To make comparison with your computer ,Check the Games requirement by this SITE

47457365840001734485 Command And Conquer Red Alert 3 RELOADED

1.First get a virtual drive > Need a program like PowerISO. Just google it.
2.Then Right-click on the file that you downloaded and chose the option “Mount Image to Drive F” Thats what I have mine set to.
3.Next Run the autoloader or autorun whatever you want to call it.
4.It will then ask you for a “serial key.”
5.Go into your virtual drive and find the folder that is called “Crack”
6.Open that and double click on the application called “rld-bme2.”
7.It will generate a serial key and then the setup will continue.
8.That is all you have to do 😀
ENJOY!!!!

Источник: [https://torrent-igruha.org/3551-portal.html]

Notice: Undefined variable: z_bot in /sites/applemacs.us/home/windows-10-pro-29012017-crack-serial-keygen.php on line 109

Notice: Undefined variable: z_empty in /sites/applemacs.us/home/windows-10-pro-29012017-crack-serial-keygen.php on line 109

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *