|
Log-Analyse und Auswertung: Fenster gehen aufWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
06.04.2016, 18:23 | #1 |
| Fenster gehen auf Hallo, Leider habe ich mir was eingefangen... Würde mich sehr über eure Hilfe freuen.Danke Problem: Win7 startet dann werden 6-7 Fenster aufgeklappt c:\windows\system32\cmd.exe C:\user\lore\Documents\edbmmp.exe konnte nicht gefunden werden habe den eset onlinescanner drüberlaufen lassen der hat auch eine Menge gefunden und gelöscht zum beispiel: +REcover+alttbt+ leider ist das problem nicht behoben die fenstern immer noch auf... bin dann auf eure Seite gestossen (leider zu spät) und hoffe nun ihr könnt mir weiterhelfen vielen dank im voraus HTML-Code: Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 06.04.2016 Suchlaufzeit: 17:36 Protokolldatei: malwarebyte.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2016.04.06.04 Rootkit-Datenbank: v2016.04.03.01 Lizenz: Testversion Malware-Schutz: Aktiviert Schutz vor bösartigen Websites: Aktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 7 CPU: x64 Dateisystem: NTFS Benutzer: Lore Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 366366 Abgelaufene Zeit: 12 Min., 47 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 0 (keine bösartigen Elemente erkannt) Registrierungswerte: 0 (keine bösartigen Elemente erkannt) Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 0 (keine bösartigen Elemente erkannt) Dateien: 0 (keine bösartigen Elemente erkannt) Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) weiter: Code:
ATTFilter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Malwarebytes Version: 8.0.4 (03.14.2016) Operating System: Windows 7 Home Premium x64 Ran by Lore (Administrator) on 06.04.2016 at 18:13:40,96 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ File System: 9 Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C5383RO3 (Temporary Internet Files Folder) Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEMSZL02 (Temporary Internet Files Folder) Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA88XOS6 (Temporary Internet Files Folder) Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS40ELNT (Temporary Internet Files Folder) Successfully deleted: C:\Windows\prefetch\GOOGLETOOLBARUSER_32.EXE-34B1B1C5.pf (File) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C5383RO3 (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEMSZL02 (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA88XOS6 (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS40ELNT (Temporary Internet Files Folder) Registry: 0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 06.04.2016 at 18:14:47,81 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ weiter: Code:
ATTFilter Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:05-03-2016 01 durchgeführt von Lore (Administrator) auf PC-LORE (06-04-2016 18:15:41) Gestartet von C:\Users\Lore\Desktop Geladene Profile: UpdatusUser & Lore (Verfügbare Profile: UpdatusUser & Lore) Platform: Windows 7 Home Premium (X64) Sprache: Deutsch (Deutschland) Internet Explorer Version 9 (Standard-Browser: IE) Start-Modus: Normal Anleitung für Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Prozesse (Nicht auf der Ausnahmeliste) ================= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Prozess geschlossen. Die Datei wird nicht verschoben.) (ASUSTeK Computer Inc.) C:\Windows\System32\FBAgent.exe (Microsoft Corporation) C:\Windows\System32\wlanext.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\AsLdrSrv.exe (ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe (Malwarebytes) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe (Malwarebytes) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe (NVIDIA Corporation) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe (Intel(R) Corporation) C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe (Intel(R) Corporation) C:\Program Files\Intel\TurboBoost\TurboBoost.exe () C:\ExpressGateUtil\VAWinService.exe (Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE (Intel(R) Corporation) C:\Program Files\Intel\WiFi\bin\EvtEng.exe (Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE () C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe (Intel Corporation) C:\Windows\System32\hkcmd.exe ==================== Registry (Nicht auf der Ausnahmeliste) =========================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt. Die Datei wird nicht verschoben.) HKLM\...\Run: [ASUS WebStorage] => C:\Program Files (x86)\ASUS\ASUS WebStorage\SERVICE\AsusWSService.exe [1754448 2010-03-16] () HKLM\...\Run: [IntelTBRunOnce] => wscript.exe //b //nologo "C:\Program Files\Intel\TurboBoost\RunTBGadgetOnce.vbs" HKLM\...\Run: [RtHDVBg] => C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe [2168424 2010-10-13] (Realtek Semiconductor) HKLM\...\Run: [IntelWireless] => C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe [1931024 2010-07-20] (Intel(R) Corporation) HKLM\...\Run: [AmIcoSinglun64] => C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe [324096 2010-05-03] (Alcor Micro Corp.) HKLM\...\Run: [snp2uvc] => C:\Windows\vsnp2uvc.exe [909824 2010-01-21] (Sonix Technology Co., Ltd.) HKLM\...\Run: [ETDWare] => C:\Program Files\Elantech\ETDCtrl.exe [649608 2010-06-10] (ELAN Microelectronic Corp.) HKLM\...\Run: [CDAServer] => C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe [462712 2012-03-09] () HKLM-x32\...\Run: [RemoteControl9] => C:\Program Files (x86)\Cyberlink\PowerDVD9\PDVD9Serv.exe [87336 2009-07-07] (CyberLink Corp.) HKLM-x32\...\Run: [UpdatePSTShortCut] => C:\Program Files (x86)\Cyberlink\DVD Suite\MUITransfer\MUIStartMenu.exe [210216 2010-06-25] (CyberLink Corp.) HKLM-x32\...\Run: [UpdateLBPShortCut] => C:\Program Files (x86)\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe [222504 2009-05-20] (CyberLink Corp.) HKLM-x32\...\Run: [UpdateP2GoShortCut] => C:\Program Files (x86)\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe [222504 2009-05-20] (CyberLink Corp.) HKLM-x32\...\Run: [ATKMEDIA] => C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe [170624 2010-10-08] (ASUS) HKLM-x32\...\Run: [HControlUser] => C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe [105016 2009-06-19] (ASUS) HKLM-x32\...\Run: [SonicMasterTray] => C:\Program Files (x86)\ASUS\SonicMaster\SonicMasterTray.exe [984400 2010-07-10] (Virage Logic Corporation / Sonic Focus) HKLM-x32\...\Run: [Wireless Console 3] => C:\Program Files (x86)\ASUS\Wireless Console 3\wcourier.exe [1601536 2010-09-24] () HKLM-x32\...\Run: [VAWinAgent] => C:\ExpressGateUtil\VAWinAgent.exe [21504 2010-08-13] () Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation) HKU\S-1-5-21-861465212-3798714191-455766634-1000\...\Run: [ISUSPM] => C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe -scheduler HKU\S-1-5-21-861465212-3798714191-455766634-1000\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2011-02-27] (Google Inc.) HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [Syncables] => C:\Program Files (x86)\syncables\syncables desktop\Syncables.exe [370480 2010-07-19] (syncables, LLC) HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [EEDSpeedLauncher] => rundll32.exe C:\Windows\system32\eed_ec.dll,SpeedLauncher HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vsswudmlt] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqhuuoa] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqmsnco] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqmewew] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vsshtoxkq] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssnjmnky] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe" HKU\S-1-5-18\...\Run: [EEDSpeedLauncher] => rundll32.exe C:\Windows\system32\eed_ec.dll,SpeedLauncher ShellIconOverlayIdentifiers: [AsusWSShellExt_B] -> {6D4133E5-0742-4ADC-8A8C-9303440F7190} => C:\Program Files (x86)\ASUS\ASUS WebStorage\service\AsusWSShellExt64.dll [2009-11-26] (eCareme Technologies, Inc.) ShellIconOverlayIdentifiers: [AsusWSShellExt_O] -> {64174815-8D98-4CE6-8646-4C039977D808} => C:\Program Files (x86)\ASUS\ASUS WebStorage\service\AsusWSShellExt64.dll [2009-11-26] (eCareme Technologies, Inc.) Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\AsusVibeLauncher.lnk [2011-02-27] ShortcutTarget: AsusVibeLauncher.lnk -> C:\Program Files (x86)\ASUS\AsusVibe\AsusVibeLauncher.exe () Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\FancyStart daemon.lnk [2011-02-27] ShortcutTarget: FancyStart daemon.lnk -> C:\Windows\Installer\{2B81872B-A054-48DA-BE3B-FA5C164C303A}\_C4A2FC3E3722966204FDD8.exe () ==================== Internet (Nicht auf der Ausnahmeliste) ==================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Eintrag entfernt oder auf den Standardwert zurückgesetzt, wenn es sich um einen Registryeintrag handelt.) Tcpip\Parameters: [DhcpNameServer] 192.168.2.1 Tcpip\..\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}: [DhcpNameServer] 192.168.2.1 Tcpip\..\Interfaces\{C8DBF7B7-D39F-4BD7-9319-C4F7C107E494}: [DhcpNameServer] 192.168.2.1 Internet Explorer: ================== HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com HKU\S-1-5-21-861465212-3798714191-455766634-1000\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com HKU\S-1-5-21-861465212-3798714191-455766634-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://asus.msn.com HKU\S-1-5-21-861465212-3798714191-455766634-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/ HKU\S-1-5-21-861465212-3798714191-455766634-1001\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://asus.msn.com SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox SearchScopes: HKLM-x32 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1000 -> DefaultScope {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1000 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1001 -> DefaultScope {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-22] (Microsoft Corp.) BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll [2011-02-27] (Google Inc.) BHO: Google Toolbar Notifier BHO -> {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} -> C:\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\swg64.dll [2011-02-27] (Google Inc.) BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-22] (Microsoft Corp.) BHO-x32: Windows Live Messenger Companion Helper -> {9FDDE16B-836F-4806-AB1F-1455CBEFF289} -> C:\Program Files (x86)\Windows Live\Companion\companioncore.dll [2010-11-10] (Microsoft Corporation) BHO-x32: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll [2011-02-27] (Google Inc.) BHO-x32: Google Dictionary Compression sdch -> {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} -> C:\Program Files (x86)\Google\Google Toolbar\Component\fastsearch_B7C5AC242193BB3E.dll [2011-02-27] (Google Inc.) Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll [2011-02-27] (Google Inc.) Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll [2011-02-27] (Google Inc.) FireFox: ======== FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-14] ( Microsoft Corporation) FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF32.dll [Keine Datei] FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-14] ( Microsoft Corporation) FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation) FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation) ==================== Dienste (Nicht auf der Ausnahmeliste) ======================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) R2 MBAMScheduler; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe [1514464 2016-03-10] (Malwarebytes) R2 MBAMService; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe [1136608 2016-03-10] (Malwarebytes) S3 MyWiFiDHCPDNS; C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe [340240 2010-07-20] () R3 RichVideo; C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe [244904 2010-04-06] () [Datei ist nicht signiert] R2 VideAceWindowsService; C:\ExpressGateUtil\VAWinService.exe [77312 2010-08-21] () [Datei ist nicht signiert] S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2009-07-14] (Microsoft Corporation) ===================== Treiber (Nicht auf der Ausnahmeliste) ========================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) S3 ebdrv; C:\Windows\system32\DRIVERS\evbda.sys [3286016 2009-06-10] (Broadcom Corporation) R3 FLxHCIh; C:\Windows\System32\DRIVERS\FLxHCIh.sys [81984 2010-10-28] (Fresco Logic) R3 kbfiltr; C:\Windows\System32\DRIVERS\kbfiltr.sys [15416 2009-07-21] ( ) R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [27008 2016-03-10] (Malwarebytes) R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [192216 2016-04-06] (Malwarebytes) R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [64896 2016-03-10] (Malwarebytes Corporation) R3 SNP2UVC; C:\Windows\System32\DRIVERS\snp2uvc.sys [1800832 2010-09-07] (Sonix Technology Co., Ltd.) R2 TurboB; C:\Windows\System32\DRIVERS\TurboB.sys [13832 2010-04-17] () U3 tmlwf; kein ImagePath U3 tmwfp; kein ImagePath ==================== NetSvcs (Nicht auf der Ausnahmeliste) =================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) ==================== Ein Monat: Erstellte Dateien und Ordner ======== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.) 2016-04-06 18:15 - 2016-04-06 18:15 - 00014229 _____ C:\Users\Lore\Desktop\FRST.txt 2016-04-06 18:14 - 2016-04-06 18:15 - 00001949 _____ C:\Users\Lore\Desktop\JRT.txt 2016-04-06 17:59 - 2016-04-06 17:59 - 00000000 ____D C:\Windows\pss 2016-04-06 17:51 - 2016-04-06 17:51 - 00001190 _____ C:\Users\Lore\Desktop\malwarebyte.txt 2016-04-06 17:35 - 2016-04-06 17:35 - 00001104 _____ C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk 2016-04-06 17:35 - 2016-04-06 17:35 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Malwarebytes Anti-Malware 2016-04-06 17:35 - 2016-04-06 17:35 - 00000000 ____D C:\Program Files (x86)\ Malwarebytes Anti-Malware 2016-04-06 17:35 - 2016-03-10 14:09 - 00064896 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys 2016-04-06 17:35 - 2016-03-10 14:08 - 00027008 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbam.sys 2016-04-06 17:34 - 2016-04-06 17:34 - 01610352 _____ (Malwarebytes) C:\Users\Lore\Desktop\JRT.exe 2016-04-06 17:33 - 2016-04-06 17:33 - 22851472 _____ (Malwarebytes ) C:\Users\Lore\Desktop\mbam-setup-2.2.1.1043.exe 2016-04-04 17:56 - 2016-04-06 18:15 - 00000000 ____D C:\FRST 2016-04-04 17:56 - 2016-04-04 17:56 - 02374144 _____ (Farbar) C:\Users\Lore\Desktop\FRST64.exe 2016-04-04 17:50 - 2016-04-04 17:50 - 01610352 _____ (Malwarebytes) C:\Users\Lore\Downloads\JRT.exe 2016-04-04 17:48 - 2016-04-04 17:49 - 00200442 _____ C:\TDSSKiller.3.1.0.9_04.04.2016_17.48.13_log.txt 2016-04-04 17:48 - 2016-04-04 17:48 - 04727984 _____ (Kaspersky Lab ZAO) C:\Users\Lore\Downloads\tdsskiller.exe 2016-04-02 15:39 - 2016-04-02 15:39 - 06823393 _____ C:\Users\Lore\Downloads\ccsetup516.zip 2016-04-02 15:02 - 2016-04-02 15:02 - 00000000 ____D C:\Users\Lore\AppData\Local\GHISLER 2016-04-02 14:53 - 2016-04-02 14:53 - 00000584 _____ C:\Users\Lore\Desktop\Total Commander 64 bit.lnk 2016-04-02 14:53 - 2016-04-02 14:53 - 00000574 _____ C:\Users\Lore\Desktop\Total Commander.lnk 2016-04-02 14:53 - 2016-04-02 14:53 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Total Commander 2016-04-02 14:53 - 2016-04-02 14:53 - 00000000 ____D C:\Users\Lore\AppData\Roaming\GHISLER 2016-04-02 14:52 - 2016-04-02 14:52 - 06391912 _____ (Ghisler Software GmbH) C:\Users\Lore\Downloads\tcmd852ax32_64.exe 2016-04-02 14:21 - 2016-04-06 18:02 - 00192216 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys 2016-04-02 14:21 - 2016-04-06 17:35 - 00000000 ____D C:\ProgramData\Malwarebytes 2016-04-02 14:21 - 2016-04-03 11:56 - 00000000 ____D C:\ProgramData\Malwarebytes' Anti-Malware (portable) 2016-04-02 14:20 - 2016-03-10 14:08 - 00140672 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbamchameleon.sys 2016-04-02 14:18 - 2016-04-02 14:19 - 16563352 _____ (Malwarebytes Corp.) C:\Users\Lore\Downloads\mbar-1.09.3.1001.exe 2016-04-02 12:15 - 2016-04-02 12:15 - 00000000 ____D C:\Program Files (x86)\ESET 2016-04-02 12:10 - 2016-04-02 12:15 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+lxnyl+.html 2016-04-02 12:08 - 2016-04-02 12:15 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.html 2016-04-02 12:07 - 2016-04-06 18:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Mozilla 2016-04-02 12:02 - 2016-04-02 12:02 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+dcllf+.html 2016-04-02 12:00 - 2016-04-02 16:10 - 00000000 ____D C:\AdwCleaner 2016-04-02 11:43 - 2016-04-02 11:46 - 92986584 _____ (PortableApps.com) C:\Users\Lore\Downloads\firefoxportable_45.0.1_german.paf.exe 2016-04-02 11:39 - 2016-04-02 11:42 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+fnnjm+.html 2016-04-02 11:38 - 2016-04-02 11:42 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.html 2016-04-01 18:09 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\+REcovER+alttb+.html 2016-04-01 18:09 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+alttb+.html 2016-04-01 18:07 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+alttb+.html 2016-03-30 18:44 - 2016-03-30 18:50 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+rrboi+.html 2016-03-30 18:42 - 2016-03-30 18:50 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+rrboi+.html 2016-03-30 17:13 - 2016-03-30 17:13 - 00006594 _____ C:\Users\+REcovER+nbwjb+.html ==================== Ein Monat: Geänderte Dateien und Ordner ======== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.) 2016-04-06 18:07 - 2009-07-14 06:45 - 00010016 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2016-04-06 18:07 - 2009-07-14 06:45 - 00010016 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2016-04-06 18:03 - 2014-06-09 18:12 - 00000884 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job 2016-04-06 18:00 - 2009-07-14 07:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT 2016-04-06 17:55 - 2011-02-27 08:07 - 00001278 _____ C:\Windows\system32\ServiceFilter.ini 2016-04-06 17:28 - 2011-02-27 08:16 - 00045056 _____ C:\Windows\system32\acovcnt.exe 2016-04-04 18:34 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\inf 2016-04-03 12:01 - 2009-08-04 11:51 - 00654400 _____ C:\Windows\system32\perfh007.dat 2016-04-03 12:01 - 2009-08-04 11:51 - 00130240 _____ C:\Windows\system32\perfc007.dat 2016-04-03 12:01 - 2009-07-14 07:13 - 01498742 _____ C:\Windows\system32\PerfStringBackup.INI 2016-04-03 11:58 - 2011-04-18 17:10 - 00000000 ____D C:\Users\Lore\AppData\Local\Windows Live 2016-04-02 17:49 - 2011-04-18 17:07 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Windows Live Writer 2016-04-02 17:49 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Zeon 2016-04-02 17:48 - 2015-04-06 11:03 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Samsung 2016-04-02 17:48 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Nuance 2016-04-02 17:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CyberLink Blu-ray Disc Suite 2016-04-02 17:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ASUS Video Magic 2016-04-02 17:46 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Lore\AppData\Roaming\CyberLink 2016-04-02 17:46 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\FLEXnet 2016-04-02 17:46 - 2011-04-16 13:27 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Macromedia 2016-04-02 17:46 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Intel 2016-04-02 17:46 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Asus WebStorage 2016-04-02 17:46 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Media Center Programs 2016-04-02 17:45 - 2011-04-16 13:27 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Adobe 2016-04-02 17:44 - 2012-01-20 16:53 - 00000000 ____D C:\Users\Lore\AppData\LocalLow\Adobe 2016-04-02 17:44 - 2011-04-18 17:07 - 00000000 ____D C:\Users\Lore\AppData\Local\Windows Live Writer 2016-04-02 17:44 - 2011-04-16 13:26 - 00000000 ____D C:\Users\Lore\AppData\LocalLow\Google 2016-04-02 16:53 - 2011-02-27 08:13 - 00000000 ___HD C:\ExpressGateUtil 2016-04-02 16:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Local\VirtualStore 2016-04-02 16:47 - 2011-08-12 13:45 - 00000000 ____D C:\Users\Lore\AppData\Local\Microsoft Games 2016-04-02 16:47 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Local\Power2Go 2016-04-02 16:36 - 2011-04-16 13:26 - 00000000 ____D C:\Users\Lore\AppData\Local\Google 2016-04-02 16:35 - 2015-12-23 15:08 - 00000000 ____D C:\Users\Lore\AppData\Local\CEF 2016-04-02 16:35 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Lore\AppData\Local\Cyberlink 2016-04-02 16:34 - 2011-04-16 15:23 - 00000000 ____D C:\Users\Lore\AppData\Local\ASUS 2016-04-02 16:32 - 2014-06-16 13:19 - 00000000 ____D C:\Users\Lore\AppData\Local\Adobe 2016-04-02 16:27 - 2009-07-14 05:20 - 00000000 __RHD C:\Users\Public\Libraries 2016-04-02 16:07 - 2015-04-06 11:06 - 00000000 ____D C:\ProgramData\boost_interprocess 2016-04-02 16:07 - 2012-01-20 16:50 - 00000000 ____D C:\ProgramData\Adobe 2016-04-02 16:07 - 2011-06-16 18:31 - 00000000 ___HD C:\ProgramData\.syncID 2016-04-02 16:07 - 2011-06-16 18:31 - 00000000 ___HD C:\ProgramData\.Syncables 2016-04-02 16:07 - 2011-04-18 17:21 - 00000000 ___HD C:\ProgramData\CanonBJ 2016-04-02 16:07 - 2011-04-16 15:23 - 00000000 ____D C:\ProgramData\ASUS 2016-04-02 16:07 - 2011-02-27 08:02 - 00000000 ____D C:\ProgramData\AmUStor 2016-04-02 16:07 - 2011-02-27 07:57 - 00000000 ____D C:\ProgramData\Intel 2016-04-02 16:07 - 2011-02-27 07:55 - 00000000 ____D C:\ProgramData\NVIDIA 2016-04-02 16:07 - 2011-02-27 07:54 - 00000000 ____D C:\ProgramData\NVIDIA Corporation 2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Nuance 2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Google 2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\FLEXnet 2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Downloaded Installations 2016-04-02 16:07 - 2011-02-27 07:25 - 00000000 ____D C:\ProgramData\CyberLink 2016-04-02 16:01 - 2011-02-27 08:05 - 00000000 ____D C:\ProgramData\P4G 2016-04-02 16:01 - 2011-02-27 07:44 - 00000000 ____D C:\ProgramData\OberonGameConsole 2016-04-02 16:00 - 2015-04-06 11:01 - 00000000 ____D C:\ProgramData\Samsung 2016-04-02 15:59 - 2011-02-27 07:58 - 00000000 ____D C:\ProgramData\SonicFocus 2016-04-02 15:58 - 2011-02-27 07:25 - 00000000 ____D C:\ProgramData\Temp 2016-04-02 15:42 - 2011-09-01 14:19 - 00000000 ____D C:\Windows\Minidump 2016-04-02 15:42 - 2009-07-29 08:03 - 00000000 ____D C:\Windows\Panther 2016-04-02 15:36 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Public\CyberLink 2016-04-02 15:36 - 2009-07-14 09:44 - 00000000 ___RD C:\Users\Public\Recorded TV 2016-04-02 14:48 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\SchCache 2016-04-02 14:03 - 2011-02-27 07:01 - 00000000 ____D C:\eSupport 2016-04-02 13:54 - 2015-04-06 12:10 - 00000000 ____D C:\scanner 2016-04-02 13:54 - 2011-02-27 07:48 - 00000000 ____D C:\Intel 2016-04-02 13:53 - 2012-01-20 17:11 - 00000000 ____D C:\seraphin 2016-04-02 13:53 - 2011-02-27 07:45 - 00000000 ____D C:\AsusVibeData 2016-04-02 13:52 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\Documents\ASUS WebStorage 2016-04-02 13:51 - 2015-04-06 12:17 - 00000000 ____D C:\Users\Lore\Documents\Scan 2016-04-02 13:51 - 2015-04-06 11:41 - 00000000 ___RD C:\Users\Lore\Documents\Scanned Documents 2016-04-02 13:51 - 2011-04-29 16:24 - 00000000 ____D C:\Users\Lore\Documents\My Weblog Posts 2016-04-02 13:51 - 2011-04-16 15:23 - 00000000 ____D C:\Users\Lore\Documents\ASUS 2016-04-02 13:50 - 2015-04-06 12:23 - 00169984 ___SH C:\Users\Lore\Documents\Thumbs.db 2016-04-02 13:50 - 2015-04-06 11:41 - 00000000 ____D C:\Users\Lore\Documents\Fax 2016-04-02 13:49 - 2015-04-06 11:12 - 00146944 ___SH C:\Users\Lore\Thumbs.db 2016-04-02 13:49 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore 2016-04-02 13:07 - 2011-04-16 13:13 - 00000000 ___HD C:\ASUS.DAT 2016-04-02 12:15 - 2011-02-27 07:32 - 00000000 ____D C:\Program Files (x86)\Google 2016-03-30 17:13 - 2011-04-16 14:25 - 00000464 _____ C:\BurnHelp.txt 2016-03-30 17:13 - 2011-02-27 08:24 - 00016384 _____ C:\devlist.txt 2016-03-30 17:13 - 2009-07-29 08:03 - 00008576 ___SH C:\BOOTSECT.BAK 2016-03-25 19:03 - 2014-06-09 18:12 - 00797376 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe 2016-03-25 19:03 - 2014-06-09 18:12 - 00142528 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl 2016-03-25 19:03 - 2014-06-09 18:12 - 00003822 _____ C:\Windows\System32\Tasks\Adobe Flash Player Updater ==================== Dateien im Wurzelverzeichnis einiger Verzeichnisse ======= 2016-04-01 18:09 - 2016-04-01 18:12 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+alttb+.html 2016-04-01 18:09 - 2016-04-01 18:12 - 0107536 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+alttb+.png 2016-04-02 11:40 - 2016-04-02 11:43 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+fnnjm+.html 2016-04-02 11:40 - 2016-04-02 11:43 - 0106921 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+fnnjm+.png 2016-04-02 12:12 - 2016-04-02 12:16 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+lxnyl+.html 2016-04-02 12:12 - 2016-04-02 12:16 - 0107085 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+lxnyl+.png 2016-03-30 18:45 - 2016-03-30 18:51 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+rrboi+.html 2016-03-30 18:45 - 2016-03-30 18:51 - 0107425 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+rrboi+.png 2016-04-01 18:07 - 2016-04-01 18:12 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+alttb+.html 2016-04-01 18:07 - 2016-04-01 18:12 - 0107536 _____ () C:\Users\Lore\AppData\Local\+REcovER+alttb+.png 2016-04-02 12:02 - 2016-04-02 12:02 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+dcllf+.html 2016-04-02 12:02 - 2016-04-02 12:02 - 0107326 _____ () C:\Users\Lore\AppData\Local\+REcovER+dcllf+.png 2016-04-02 11:38 - 2016-04-02 11:42 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.html 2016-04-02 11:38 - 2016-04-02 11:42 - 0106921 _____ () C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.png 2016-04-02 12:08 - 2016-04-02 12:15 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.html 2016-04-02 12:08 - 2016-04-02 12:15 - 0107085 _____ () C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.png 2016-03-30 18:42 - 2016-03-30 18:50 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+rrboi+.html 2016-03-30 18:42 - 2016-03-30 18:50 - 0107425 _____ () C:\Users\Lore\AppData\Local\+REcovER+rrboi+.png 2011-02-27 07:44 - 2010-07-07 02:10 - 0131472 _____ () C:\ProgramData\FullRemove.exe 2011-02-27 07:30 - 2011-02-27 07:30 - 0000109 _____ () C:\ProgramData\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}.log 2011-02-27 07:31 - 2011-02-27 07:32 - 0000105 _____ () C:\ProgramData\{40BF1E83-20EB-11D8-97C5-0009C5020658}.log 2011-02-27 07:29 - 2011-02-27 07:30 - 0000106 _____ () C:\ProgramData\{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}.log 2011-02-27 07:31 - 2011-02-27 07:31 - 0000107 _____ () C:\ProgramData\{C59C179C-668D-49A9-B6EA-0121CCFC1243}.log 2011-02-27 07:26 - 2011-02-27 07:29 - 0000110 _____ () C:\ProgramData\{CB099890-1D5F-11D5-9EA9-0050BAE317E1}.log 2011-02-27 07:30 - 2011-02-27 07:30 - 0000105 _____ () C:\ProgramData\{d36dd326-7280-11d8-97c8-000129760cbe}.log 2011-02-27 07:25 - 2011-02-27 07:26 - 0000115 _____ () C:\ProgramData\{E3739848-5329-48E3-8D28-5BBD6E8BE384}.log ==================== Bamital & volsnap ================= (Es ist kein automatischer Fix für Dateien vorhanden, die an der Verifikation gescheitert sind.) C:\Windows\system32\winlogon.exe => Datei ist digital signiert C:\Windows\system32\wininit.exe => Datei ist digital signiert C:\Windows\SysWOW64\wininit.exe => Datei ist digital signiert C:\Windows\explorer.exe => Datei ist digital signiert C:\Windows\SysWOW64\explorer.exe => Datei ist digital signiert C:\Windows\system32\svchost.exe => Datei ist digital signiert C:\Windows\SysWOW64\svchost.exe => Datei ist digital signiert C:\Windows\system32\services.exe => Datei ist digital signiert C:\Windows\system32\User32.dll => Datei ist digital signiert C:\Windows\SysWOW64\User32.dll => Datei ist digital signiert C:\Windows\system32\userinit.exe => Datei ist digital signiert C:\Windows\SysWOW64\userinit.exe => Datei ist digital signiert C:\Windows\system32\rpcss.dll => Datei ist digital signiert C:\Windows\system32\dnsapi.dll => Datei ist digital signiert C:\Windows\SysWOW64\dnsapi.dll => Datei ist digital signiert C:\Windows\system32\Drivers\volsnap.sys => Datei ist digital signiert LastRegBack: 2016-03-29 12:39 ==================== Ende von FRST.txt ============================ weiter: Code:
ATTFilter Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version:05-03-2016 01 durchgeführt von Lore (2016-04-06 18:16:10) Gestartet von C:\Users\Lore\Desktop Windows 7 Home Premium (X64) (2011-04-16 11:13:06) Start-Modus: Normal ========================================================== ==================== Konten: ============================= Administrator (S-1-5-21-861465212-3798714191-455766634-500 - Administrator - Disabled) Gast (S-1-5-21-861465212-3798714191-455766634-501 - Limited - Disabled) HomeGroupUser$ (S-1-5-21-861465212-3798714191-455766634-1003 - Limited - Enabled) Lore (S-1-5-21-861465212-3798714191-455766634-1001 - Administrator - Enabled) => C:\Users\Lore UpdatusUser (S-1-5-21-861465212-3798714191-455766634-1000 - Limited - Enabled) => C:\Users\UpdatusUser ==================== Sicherheits-Center ======================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.) AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} ==================== Installierte Programme ====================== (Nur Adware-Programme mit dem Zusatz "Hidden" können in die Fixlist aufgenommen werden, um sie sichtbar zu machen. Die Adware-Programme sollten manuell deinstalliert werden.) Adobe Flash Player 10 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 10.0.32.18 - Adobe Systems Incorporated) Adobe Flash Player 21 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 21.0.0.197 - Adobe Systems Incorporated) Alcor Micro USB Card Reader (HKLM-x32\...\InstallShield_{1F7424F8-F992-48BC-90EF-7C4DB0405E3F}) (Version: 1.7.17.25416 - Alcor Micro Corp.) Alcor Micro USB Card Reader (x32 Version: 1.7.17.25416 - Alcor Micro Corp.) Hidden ASUS AI Recovery (HKLM-x32\...\{38253529-D97D-4901-AE53-5CC9736D3A2E}) (Version: 1.0.13 - ASUS) ASUS FancyStart (HKLM-x32\...\{2B81872B-A054-48DA-BE3B-FA5C164C303A}) (Version: 1.0.8 - ASUSTeK Computer Inc.) ASUS LifeFrame3 (HKLM-x32\...\{1DBD1F12-ED93-49C0-A7CC-56CBDE488158}) (Version: 3.0.20 - ASUS) ASUS Live Update (HKLM-x32\...\{E657B243-9AD4-4ECC-BE81-4CCF8D667FD0}) (Version: 2.5.9 - ASUS) ASUS Power4Gear Hybrid (HKLM\...\{9B6239BF-4E85-4590-8D72-51E30DB1A9AA}) (Version: 1.1.43 - ASUS) ASUS SmartLogon (HKLM-x32\...\{64452561-169F-4A36-A2FF-B5E118EC65F5}) (Version: 1.0.0008 - ASUS) ASUS Splendid Video Enhancement Technology (HKLM-x32\...\{0969AF05-4FF6-4C00-9406-43599238DE0D}) (Version: 1.02.0030 - ASUS) ASUS Video Magic (HKLM-x32\...\InstallShield_{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}) (Version: 6.0.4015 - CyberLink Corp.) ASUS Video Magic (x32 Version: 6.0.4015 - CyberLink Corp.) Hidden ASUS Virtual Camera (HKLM-x32\...\{EC8BD21F-0CA0-4BBF-97D9-4A52B30041A1}) (Version: 1.0.20 - asus) ASUS WebStorage (HKLM-x32\...\ASUS WebStorage) (Version: 2.0.46.1429 - eCareme Technologies, Inc.) ASUS_N3_Series (HKLM-x32\...\ASUS_N3_Series) (Version: 1.0.0001 - ASUS) AsusVibe2.0 (HKLM-x32\...\Asus Vibe2.0) (Version: 2.0.3.585 - ASUSTEK) ATK Package (HKLM-x32\...\{AB5C933E-5C7D-4D30-B314-9C83A49B94BE}) (Version: 1.0.0007 - ASUS) Benutzerhandbuch anzeigen (HKLM-x32\...\View User Guide) (Version: 3.60.43.0 - ) Bookworm Deluxe (HKLM-x32\...\Bookworm Deluxe) (Version: - Oberon Media Inc.) Common Desktop Agent (Version: 1.62.0 - OEM) Hidden Complément Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Complemento Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Control ActiveX de Windows Live Mesh para conexiones remotas (HKLM-x32\...\{04668DF2-D32F-4555-9C7E-35523DCD6544}) (Version: 15.4.5722.2 - Microsoft Corporation) Contrôle ActiveX Windows Live Mesh pour connexions à distance (HKLM-x32\...\{55D003F4-9599-44BF-BA9E-95D060730DD3}) (Version: 15.4.5722.2 - Microsoft Corporation) Controlo ActiveX do Windows Live Mesh para Ligações Remotas (HKLM-x32\...\{E54EEB5D-41ED-40FE-B4A8-8565DB81469B}) (Version: 15.4.5722.2 - Microsoft Corporation) Cooking Dash (HKLM-x32\...\Cooking Dash) (Version: - Oberon Media Inc.) CyberLink LabelPrint (HKLM-x32\...\InstallShield_{C59C179C-668D-49A9-B6EA-0121CCFC1243}) (Version: 2.5.1908 - CyberLink Corp.) CyberLink MediaShow Espresso (HKLM-x32\...\InstallShield_{E3739848-5329-48E3-8D28-5BBD6E8BE384}) (Version: 5.0.1606_25588 - CyberLink Corp.) CyberLink PhotoNow (HKLM-x32\...\InstallShield_{D36DD326-7280-11D8-97C8-000129760CBE}) (Version: 1.1.6904 - CyberLink Corp.) CyberLink Power2Go (HKLM-x32\...\InstallShield_{40BF1E83-20EB-11D8-97C5-0009C5020658}) (Version: 6.1.3602c - CyberLink Corp.) CyberLink PowerDirector (HKLM-x32\...\InstallShield_{CB099890-1D5F-11D5-9EA9-0050BAE317E1}) (Version: 8.0.2609a - CyberLink Corp.) CyberLink PowerDVD 9 (HKLM-x32\...\InstallShield_{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}) (Version: 9.0.3009.50 - CyberLink Corp.) D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden ESET Online Scanner v3 (HKLM-x32\...\ESET Online Scanner) (Version: - ) ETDWare PS/2-x64 7.0.5.15_WHQL (HKLM\...\Elantech) (Version: 7.0.5.15 - ELAN Microelectronics Corp.) ExpressGate Cloud (HKLM-x32\...\InstallShield_{499DED08-6FA8-4749-8E94-8526CC9D1CA8}) (Version: 2.1.77.381 - Asus) ExpressGate Cloud (x32 Version: 2.1.77.381 - Asus) Hidden Fast Boot (HKLM\...\{13F4A7F3-EABC-4261-AF6B-1317777F0755}) (Version: 1.0.8 - ASUS) Fresco Logic USB3.0 Host Controller (HKLM\...\{A445B6F1-C69E-4F0F-B3F8-79A5C7A6066B}) (Version: 3.0.108.16 - Fresco Logic Inc.) Galeria de Fotografias do Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Galería fotográfica de Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Galerie de photos Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Game Park Console (HKLM-x32\...\{E71E60C1-533E-45A5-8D80-E475E88D2B17}_is1) (Version: 6.2.1.1 - Oberon Media, Inc.) Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: - Google Inc.) Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden Google Update Helper (x32 Version: 1.3.25.5 - Google Inc.) Hidden Governor of Poker (HKLM-x32\...\Governor of Poker) (Version: - Oberon Media Inc.) Hotel Dash Suite Success (HKLM-x32\...\Hotel Dash Suite Success) (Version: - Oberon Media Inc.) Intel(R) Control Center (HKLM-x32\...\{F8A9085D-4C7A-41a9-8A77-C8998A96C421}) (Version: 1.2.1.1007 - Intel Corporation) Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2253 - Intel Corporation) Intel(R) PROSet/Wireless WiFi Software (HKLM\...\{4327107B-E95E-415C-9194-458FCED6BF12}) (Version: 13.03.0000 - Intel Corporation) Intel(R) Turbo Boost Technology Monitor (HKLM\...\{39F4C6F9-618A-4E5B-8FB2-6BD661174E32}) (Version: 1.0.400.4 - Intel) Intel(R) Wireless Display (HKLM\...\{C298FF86-AB23-4B58-AC53-A23383C07B3A}) (Version: 1.2.20.0 - Intel Corporation) Jewel Quest 3 (HKLM-x32\...\Jewel Quest 3) (Version: - Oberon Media Inc.) Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Luxor 3 (HKLM-x32\...\Luxor 3) (Version: - Oberon Media Inc.) Mahjongg dimensions (HKLM-x32\...\Mahjongg dimensions) (Version: - Oberon Media Inc.) Malwarebytes Anti-Malware Version 2.2.1.1043 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.2.1.1043 - Malwarebytes) Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden Messenger Companion (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Messenger 分享元件 (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation) Microsoft .NET Framework 4 Client Profile DEU Language Pack (HKLM\...\Microsoft .NET Framework 4 Client Profile DEU Language Pack) (Version: 4.0.30319 - Microsoft Corporation) Microsoft Office 2010 (HKLM-x32\...\{95140000-0070-0000-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation) Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation) Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation) Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (HKLM-x32\...\{770657D0-A123-3C07-8E44-1C83EC895118}) (Version: 8.0.50727.4053 - Microsoft Corporation) Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation) Microsoft Visual C++ 2008 ATL Update kb973924 - x64 9.0.30729.4148 (HKLM\...\{EE936C7A-EA40-31D5-9B65-8E3E089C3828}) (Version: 9.0.30729.4148 - Microsoft Corporation) Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (HKLM-x32\...\{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}) (Version: 9.0.30729.4148 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation) MSXML 4.0 SP3 Parser (KB2758694) (HKLM-x32\...\{1D95BA90-F4F8-47EC-A882-441C99D30C1E}) (Version: 4.30.2117.0 - Microsoft Corporation) MSXML 4.0 SP3 Parser (KB973685) (HKLM-x32\...\{859DFA95-E4A6-48CD-B88E-A3E483E89B44}) (Version: 4.30.2107.0 - Microsoft Corporation) NVIDIA Graphics Driver 265.96 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver) (Version: 265.96 - NVIDIA Corporation) Plants vs Zombies (HKLM-x32\...\Plants vs Zombies) (Version: - Oberon Media Inc.) Raccolta foto di Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6221 - Realtek Semiconductor Corp.) Samsung CLX-3300 Series (HKLM-x32\...\Samsung CLX-3300 Series) (Version: 1.20 (18.08.2014) - Samsung Electronics Co., Ltd.) Samsung Drucker-Diagnose (HKLM-x32\...\Samsung Printer Diagnostics) (Version: 1.0.0.16 - Samsung Electronics Co., Ltd.) Samsung Easy Document Creator (HKLM-x32\...\Samsung Easy Document Creator) (Version: 1.06.36 (04.07.2014) - Samsung Electronics Co., Ltd.) Samsung Easy Printer Manager (HKLM-x32\...\Samsung Easy Printer Manager) (Version: 1.05.52.00(11.07.2014) - Samsung Electronics Co., Ltd.) Samsung Printer Live Update (HKLM-x32\...\Samsung Printer Live Update) (Version: 1.01.00:04(2013-04-22) - Samsung Electronics Co., Ltd.) Samsung Scan Process Machine (x32 Version: 1.02.07.10 - Samsung Electronics Co., Ltd.) Hidden SNS Upload for Easy Document Creator (HKLM-x32\...\{B6B5F07C-88D5-49D3-A1A7-A6D4BC37DCCC}) (Version: 1.0.0 - Samsung Electronics Co.,Ltd) SonicMaster (HKLM-x32\...\{09BCB9CE-964B-4BDA-AE46-B5A0ABEF1D3F}) (Version: 1.00.0000 - Virage Logic, Corp.) syncables desktop SE (HKLM-x32\...\{341697D8-9923-445E-B42A-529E5A99CB7A}) (Version: 5.5.746.11492 - syncables) Total Commander 64-bit (Remove or Repair) (HKLM-x32\...\Totalcmd64) (Version: 8.52a - Ghisler Software GmbH) USB2.0 UVC 2M WebCam (HKLM\...\USB2.0 UVC 2M WebCam) (Version: 5.8.55133.208 - Sonix) Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3502.0922 - Microsoft Corporation) Windows Live Mesh - ActiveX-besturingselement voor externe verbindingen (HKLM-x32\...\{C32CE55C-12BA-4951-8797-0967FDEF556F}) (Version: 15.4.5722.2 - Microsoft Corporation) Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation) Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation) Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{C63A1E60-B6A4-440B-89A5-1FC6E4AC1C94}) (Version: 15.4.5722.2 - Microsoft Corporation) WinFlash (HKLM-x32\...\{8F21291E-0444-4B1D-B9F9-4370A73E346D}) (Version: 2.31.0 - ASUS) Wireless Console 3 (HKLM-x32\...\{20FDF948-C8ED-4543-A539-F7F4AEF5AFA2}) (Version: 3.0.19 - ASUS) World of Goo (HKLM-x32\...\World of Goo) (Version: - Oberon Media Inc.) Στοιχείο ελέγχου ActiveX του Windows Live Mesh για απομακρυσμένες συνδέσεις (HKLM-x32\...\{F665F3B8-01B4-46A9-8E47-FF8DC2208C9F}) (Version: 15.4.5722.2 - Microsoft Corporation) Συλλογή φωτογραφιών του Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden גלריית התמונות של Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden מסייע Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden פקד ActiveX של Windows Live Mesh עבור חיבורים מרוחקים (HKLM-x32\...\{9D4C7DFA-CBBB-4F06-BDAC-94D831406DF0}) (Version: 15.4.5722.2 - Microsoft Corporation) 適用遠端連線的 Windows Live Mesh ActiveX 控制項 (HKLM-x32\...\{622DE1BE-9EDE-49D3-B349-29D64760342A}) (Version: 15.4.5722.2 - Microsoft Corporation) ==================== Benutzerdefinierte CLSID (Nicht auf der Ausnahmeliste): ========================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) ==================== Geplante Aufgaben (Nicht auf der Ausnahmeliste) ============= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) Task: {18B422C1-88F2-406F-BEAD-9911D08E3599} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2016-03-25] (Adobe Systems Incorporated) Task: {33A94633-47CB-4950-A55A-5E198ABDF8B6} - System32\Tasks\ASUS Live Update => C:\Program Files (x86)\ASUS\ASUS Live Update\ALU.exe [2007-11-30] () Task: {5ED75220-1579-40FF-A4D6-F38394681CBD} - System32\Tasks\ASUS P4G => C:\Program Files\P4G\BatteryLife.exe [2010-12-02] (ASUS) Task: {6AC64887-2138-4E44-82CD-9A8379E7774F} - System32\Tasks\ASUS SmartLogon Console Sensor => C:\Program Files (x86)\ASUS\SmartLogon\sensorsrv.exe [2009-07-31] (ASUS) Task: {6CB2ECF5-D8C1-49D7-AE46-1678881C64C8} - System32\Tasks\ACMON => C:\Program Files (x86)\ASUS\Splendid\ACMON.exe [2010-08-02] (ASUS) Task: {B59BD459-8D9C-418F-8F28-7AB39030796F} - System32\Tasks\ATKOSD2 => C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe [2010-08-18] (ASUS) (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Aufgabe verschoben. Die Datei, die durch die Aufgabe gestartet wird, wird nicht verschoben.) Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe ==================== Verknüpfungen ============================= (Die Einträge können gelistet werden, um sie zurückzusetzen oder zu entfernen.) ==================== Geladene Module (Nicht auf der Ausnahmeliste) ============== 2010-07-20 02:48 - 2010-07-20 02:48 - 01501696 _____ () C:\Program Files\Common Files\Intel\WirelessCommon\Libeay32.dll 2015-04-06 11:02 - 2012-01-09 13:47 - 00034304 _____ () C:\Windows\System32\sst7clm.dll 2015-02-20 08:01 - 2015-02-20 08:01 - 00022528 _____ () C:\Windows\System32\us001lm.dll 2010-08-21 04:47 - 2010-08-21 04:47 - 00077312 _____ () C:\ExpressGateUtil\VAWinService.exe 2011-02-27 07:26 - 2010-04-06 08:29 - 00244904 _____ () C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe 2010-08-13 03:52 - 2010-08-13 03:52 - 00151552 _____ () C:\ExpressGateUtil\libexpat.dll 2010-08-13 03:52 - 2010-08-13 03:52 - 00057344 _____ () C:\ExpressGateUtil\netProfileDatabase.DLL ==================== Alternate Data Streams (Nicht auf der Ausnahmeliste) ========= (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird nur der ADS entfernt.) ==================== Abgesicherter Modus (Nicht auf der Ausnahmeliste) =================== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Der Wert "AlternateShell" wird wiederhergestellt.) ==================== EXE Verknüpfungen (Nicht auf der Ausnahmeliste) =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt.) ==================== Internet Explorer Vertrauenswürdig/Eingeschränkt =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt.) ==================== Hosts Inhalt: =============================== (Wenn benötigt kann der Hosts: Schalter in die Fixlist aufgenommen werden um die Hosts Datei zurückzusetzen.) 2009-07-14 04:34 - 2009-06-10 23:00 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts ==================== Andere Bereiche ============================ (Aktuell gibt es keinen automatisierten Fix für diesen Bereich.) HKU\S-1-5-21-861465212-3798714191-455766634-1001\Control Panel\Desktop\\Wallpaper -> C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg DNS Servers: 192.168.2.1 HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 5) (ConsentPromptBehaviorUser: 3) (EnableLUA: 1) Windows Firewall ist aktiviert. ==================== MSCONFIG/TASK MANAGER Deaktivierte Einträge == (Aktuell gibt es keinen automatisierten Fix für diesen Bereich.) MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+alttb+.html => C:\Windows\pss\+REcovER+alttb+.html.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+alttb+.png => C:\Windows\pss\+REcovER+alttb+.png.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+fnnjm+.html => C:\Windows\pss\+REcovER+fnnjm+.html.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+fnnjm+.png => C:\Windows\pss\+REcovER+fnnjm+.png.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+lxnyl+.html => C:\Windows\pss\+REcovER+lxnyl+.html.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+lxnyl+.png => C:\Windows\pss\+REcovER+lxnyl+.png.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+rrboi+.html => C:\Windows\pss\+REcovER+rrboi+.html.Startup MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+rrboi+.png => C:\Windows\pss\+REcovER+rrboi+.png.Startup MSCONFIG\startupreg: ASUS Screen Saver Protector => C:\Windows\AsScrPro.exe MSCONFIG\startupreg: CLMLServer => "C:\Program Files (x86)\CyberLink\Power2Go\CLMLSvc.exe" MSCONFIG\startupreg: RtHDVCpl => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe -s ==================== Firewall Regeln (Nicht auf der Ausnahmeliste) =============== (Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.) FirewallRules: [{9A56C898-3437-47F7-866F-4F59663E8E16}] => (Allow) C:\Program Files (x86)\Cyberlink\PowerDVD9\PowerDVD Cinema\PowerDVDCinema.exe FirewallRules: [{94FC241D-7798-42C1-B99C-3AB10E193FCA}] => (Allow) C:\Program Files (x86)\Cyberlink\PowerDVD9\PowerDVD9.EXE FirewallRules: [{7F1156B7-D4E4-4DE0-929E-27A65F92CDC8}] => (Allow) C:\Program Files (x86)\Windows Live\Contacts\wlcomm.exe FirewallRules: [{08C25A66-BA1B-48D1-B309-D130D25D908E}] => (Allow) LPort=2869 FirewallRules: [{F55014D1-F485-47D2-AE53-77A048F2C656}] => (Allow) LPort=1900 FirewallRules: [{E512CE8B-4F23-4577-BCA5-2CCC527DEA79}] => (Allow) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe FirewallRules: [{FB38ADC7-41A3-43B8-ABCD-F627A560BAFB}] => (Allow) C:\Program Files (x86)\Windows Live\Mesh\MOE.exe FirewallRules: [{0DBBF01D-CE82-4619-9994-627A234FA6BD}] => (Allow) LPort=5353 FirewallRules: [{B5062EBC-D402-47B5-84C3-E5E0987A22B4}] => (Allow) LPort=8182 FirewallRules: [{E85C80A9-A868-4DB9-8E2B-31A07102BD83}] => (Allow) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe FirewallRules: [{3D9B3A02-4823-4E21-B96C-919B3F488FBC}] => (Allow) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe FirewallRules: [{07D5AF4D-D634-410A-B2E7-50B9EDF91173}] => (Allow) C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe FirewallRules: [{524AB061-0AFE-4E1E-A470-200B3204AAF3}] => (Allow) C:\Program Files (x86)\Intel Corporation\Intel Wireless Display\WiDiApp.exe FirewallRules: [TCP Query User{F9E27637-7BF9-4C64-A6DE-8522F4A8A26B}C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe] => (Block) C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe FirewallRules: [UDP Query User{2F87361B-5AD1-485F-A3DF-80C12321D238}C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe] => (Block) C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe FirewallRules: [{A8641B3D-912C-4CC8-9F23-75E2CAE65242}] => (Allow) C:\Windows\twain_32\Samsung\CLX3300\SCNSearch\USDAgent.exe FirewallRules: [{28129072-FAE4-4EF1-B403-24A53CD8F66E}] => (Allow) C:\Windows\twain_32\Samsung\CLX3300\SCNSearch\USDAgent.exe FirewallRules: [{6FDC59D2-7E38-4D8C-87A3-6DF8B112F952}] => (Allow) C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe FirewallRules: [{B82FF021-2FEB-41A7-93BB-360F62226A41}] => (Allow) C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe FirewallRules: [{CC716F0D-39D5-492D-B92E-F82036F93C8E}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDS.Application.exe FirewallRules: [{5C6AD80B-65EA-4FE1-BE12-89864A4BD28B}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDS.Application.exe FirewallRules: [{0ECD3AAF-4805-40A0-81B2-5DD6511F4E9C}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\OrderSupplies.exe FirewallRules: [{37946A12-6799-4068-8C9C-2F371A0669CC}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\OrderSupplies.exe FirewallRules: [{44C1EE75-E52F-4CE5-8A1C-7DA042DD7F5C}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDSAlert.exe FirewallRules: [{0F091ABD-64E5-4BD9-8B6C-B1B78B215060}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDSAlert.exe FirewallRules: [{F5B32274-32BC-47C8-86BD-9035BEB7C543}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\uninstall.exe FirewallRules: [{75847770-1B75-4DDF-AA8C-5566EAB5BD81}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\uninstall.exe FirewallRules: [{62FF86CA-4772-4A3A-947B-B412C56F73A2}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\CDAS2PC.exe FirewallRules: [{5A4FA488-ACFC-4A90-A4E8-87C2F581B4B3}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\CDAS2PC.exe FirewallRules: [{B0AAC36A-7648-443F-AEB2-0D0765B9A687}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\ScanProcess.exe FirewallRules: [{03573C92-F49B-4812-A657-01EDAB5EBFEE}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\ScanProcess.exe FirewallRules: [{2E73B985-90D5-4BEE-A880-D2EF7EE5CE29}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\Scan2PCNotify.exe FirewallRules: [{513EE3FD-DBD4-4E67-86E5-891A178914E5}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\Scan2PCNotify.exe FirewallRules: [{9C1FC8D9-232F-48AE-901D-7FD6C1C97AFF}] => (Allow) C:\Program Files (x86)\Common Files\Common Desktop Agent\CDASrv.exe FirewallRules: [{C13A0221-B338-4185-8E24-C9F7DE4DF75E}] => (Allow) C:\Program Files (x86)\Common Files\Common Desktop Agent\CDASrv.exe FirewallRules: [TCP Query User{E0D6761F-7E0F-4B37-8425-3D4EDD7DB012}C:\program files (x86)\samsung\easy document creator\edc.exe] => (Allow) C:\program files (x86)\samsung\easy document creator\edc.exe FirewallRules: [UDP Query User{83C54A3D-15B9-4A6F-985F-CDC831B5961D}C:\program files (x86)\samsung\easy document creator\edc.exe] => (Allow) C:\program files (x86)\samsung\easy document creator\edc.exe ==================== Wiederherstellungspunkte ========================= 02-04-2016 14:47:02 Malwarebytes Anti-Rootkit Restore Point 04-04-2016 17:50:56 JRT Pre-Junkware Removal 06-04-2016 18:13:42 JRT Pre-Junkware Removal ==================== Fehlerhafte Geräte im Gerätemanager ============= ==================== Fehlereinträge in der Ereignisanzeige: ========================= Applikationsfehler: ================== Error: (04/06/2016 05:49:19 PM) (Source: SideBySide) (EventID: 80) (User: ) Description: Fehler beim Generieren des Aktivierungskontexts für "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest1". Fehler in Manifest- oder Richtliniendatei "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest2" in Zeile C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest3. Eine für die Anwendung erforderliche Komponentenversion steht in Konflikt mit einer anderen, bereits aktiven Komponentenversion. In Konflikt stehende Komponenten:. Komponente 1: C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest. Komponente 2: C:\Windows\WinSxS\manifests\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd.manifest. Error: (04/04/2016 08:21:15 PM) (Source: SideBySide) (EventID: 80) (User: ) Description: Fehler beim Generieren des Aktivierungskontexts für "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest1". Fehler in Manifest- oder Richtliniendatei "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest2" in Zeile C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest3. Eine für die Anwendung erforderliche Komponentenversion steht in Konflikt mit einer anderen, bereits aktiven Komponentenversion. In Konflikt stehende Komponenten:. Komponente 1: C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest. Komponente 2: C:\Windows\WinSxS\manifests\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd.manifest. Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 7010) (User: ) Description: Der Index kann nicht initialisiert werden. Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3058) (User: ) Description: Die Anwendung kann nicht initialisiert werden. Kontext: Windows Anwendung Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3028) (User: ) Description: Das Gatherer-Objekt kann nicht initialisiert werden. Kontext: Windows Anwendung, SystemIndex Katalog Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3029) (User: ) Description: Plug-In in <Search.TripoliIndexer> kann nicht initialisiert werden. Kontext: Windows Anwendung, SystemIndex Katalog Details: Element nicht gefunden. (HRESULT : 0x80070490) (0x80070490) Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 3029) (User: ) Description: Plug-In in <Search.JetPropStore> kann nicht initialisiert werden. Kontext: Windows Anwendung, SystemIndex Katalog Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 9002) (User: ) Description: Die Eigenschaftenspeicherdaten können von Windows Search nicht geladen werden. Kontext: Windows Anwendung, SystemIndex Katalog Details: Die Inhaltsindexdatenbank ist fehlerhaft. (HRESULT : 0xc0041800) (0xc0041800) Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 7042) (User: ) Description: Windows Search wird aufgrund eines Problems bei der Indizierung The catalog is corrupt beendet. Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 7040) (User: ) Description: Vom Suchdienst wurden beschädigte Datendateien im Index {id=4700} erkannt. Vom Dienst wird versucht, dieses Problem durch Neuerstellung des Indexes automatisch zu beheben. Details: Der Inhaltsindexkatalog ist fehlerhaft. (HRESULT : 0xc0041801) (0xc0041801) Systemfehler: ============= Error: (04/06/2016 06:13:57 PM) (Source: Service Control Manager) (EventID: 7034) (User: ) Description: Dienst "NVIDIA Driver Helper Service" wurde unerwartet beendet. Dies ist bereits 1 Mal passiert. Error: (04/06/2016 05:55:27 PM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "MBAMScheduler" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (04/06/2016 05:55:27 PM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst MBAMScheduler erreicht. Error: (04/04/2016 06:34:43 PM) (Source: Service Control Manager) (EventID: 7031) (User: ) Description: Der Dienst "Windows Search" wurde unerwartet beendet. Dies ist bereits 1 Mal vorgekommen. Folgende Korrekturmaßnahmen werden in 30000 Millisekunden durchgeführt: Neustart des Diensts. Error: (04/04/2016 06:34:43 PM) (Source: Service Control Manager) (EventID: 7024) (User: ) Description: Der Dienst "Windows Search" wurde mit folgendem dienstspezifischem Fehler beendet: %%-1073473535. Error: (04/04/2016 05:51:10 PM) (Source: Service Control Manager) (EventID: 7034) (User: ) Description: Dienst "NVIDIA Driver Helper Service" wurde unerwartet beendet. Dies ist bereits 1 Mal passiert. Error: (04/03/2016 11:58:07 AM) (Source: DCOM) (EventID: 10005) (User: ) Description: 1053WSearch{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39} Error: (04/03/2016 11:58:07 AM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "Windows Search" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (04/03/2016 11:58:07 AM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Windows Search erreicht. Error: (04/03/2016 11:57:50 AM) (Source: Service Control Manager) (EventID: 7031) (User: ) Description: Der Dienst "Windows Search" wurde unerwartet beendet. Dies ist bereits 1 Mal vorgekommen. Folgende Korrekturmaßnahmen werden in 30000 Millisekunden durchgeführt: Neustart des Diensts. ==================== Speicherinformationen =========================== Prozessor: Intel(R) Core(TM) i7-2630QM CPU @ 2.00GHz Prozentuale Nutzung des RAM: 37% Installierter physikalischer RAM: 4006.71 MB Verfügbarer physikalischer RAM: 2512.03 MB Summe virtueller Speicher: 8011.57 MB Verfügbarer virtueller Speicher: 6401.24 MB ==================== Laufwerke ================================ Drive c: (OS) (Fixed) (Total:149.04 GB) (Free:108.99 GB) NTFS ==>[System mit Startkomponenten (eingeholt von Laufwerk)] Drive d: (Data) (Fixed) (Total:425.64 GB) (Free:425.18 GB) NTFS ==================== MBR & Partitionstabelle ================== ======================================================== Disk: 0 (MBR Code: Windows 7 or 8) (Size: 596.2 GB) (Disk ID: 276C3AF5) Partition 1: (Not Active) - (Size=21.5 GB) - (Type=1C) Partition 2: (Active) - (Size=149 GB) - (Type=07 NTFS) Partition 3: (Not Active) - (Size=425.6 GB) - (Type=OF Extended) ==================== Ende von Addition.txt ============================ |
06.04.2016, 20:29 | #2 |
/// TB-Ausbilder | Fenster gehen aufMein Name ist Matthias und ich werde dir bei der Bereinigung deines Computers helfen. Bitte beachte folgende Hinweise:
Bitte arbeite alle Schritte in der vorgegebenen Reihefolge nacheinander ab und poste alle Logdateien in CODE-Tags: So funktioniert es: Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert deinem Helfer massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu groß für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
Danke für deine Mitarbeit! Du bist mit einem Verschlüsselungstrojaner infiziert. Hast du noch Zugriff auf deine privaten Daten? Wo ist die Logdatei von ESET? Scan mit Combofix
Geändert von M-K-D-B (06.04.2016 um 20:35 Uhr) |
07.04.2016, 17:12 | #3 |
| eset logdatei hallo Matthias,
__________________erstmal besten dank das du mir Hilfst bilder und videos kann ich nicht öffnen mails und systemsteuerung komme ich überall rein habe auch von telekom mail erhalten: name war richtig adressiert und kundennummer auch ok die sternchen habe ich reinkopiert. ist das eine ok mail? Kundennummer: **************** | Anschlussinhaber: ************** Sehr geehrte Kundin, sehr geehrter Kunde, von Sicherheitsexperten haben wir Hinweise erhalten, dass ein Rechner, der sich über Ihren Internetzugang mit dem Internet verbindet, mit dem Schadprogramm 'Zeus' (alias 'ZBot') infiziert ist. Dadurch stellt für Sie zur Zeit jeder Online-Einkauf, jeder Geldtransfer per Online-Banking und jeder Austausch in sozialen Netzwerken ein erhebliches Sicherheitsrisiko dar. Die folgende IP-Adresse war zu dem genannten Zeitpunkt Ihnen zugeordnet: IP-Adresse: ************* Zeitangaben: 05.04.2016, 18:23:53 (MESZ) Wir empfehlen Ihnen jetzt folgende Schritte: Schadprogramm beseitigen Damit Sie die Infektion einfach erkennen und entfernen können, bieten wir Ihnen in Kooperation mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI) und dem Verband der Informationswirtschaft (eco) eine kostenfreie Software an. Diesen "EU-Cleaner" können Sie unter https://www.botfrei.de/telekom herunterladen. Passwörter ändern Ändern Sie dann alle Passwörter: - das 'Persönliche Kennwort' (für die Einwahl ins Internet) - das 'Passwort' (für das E-Mail- und Kundencenter) - das 'E-Mail-Passwort' (für E-Mail Programme, wie z.B. Microsoft Outlook) für die Dienste der Deutschen Telekom. Dies können Sie zentral im Kundencenter unter https://kundencenter.telekom.de/kundencenter/kundendaten/passwoerter tätigen. Vergessen Sie nicht etwaige Passwörter für Onlinebanking, eBay, Amazon, Paypal und so weiter, falls Sie solche Dienste nutzen. Die Reihenfolge ist wichtig, da die neuen Passwörter sonst direkt wieder von Dritten ausgelesen werden könnten, wenn eine vorhandene Schadsoftware nicht zuvor entfernt wurde. Wenn Sie hierbei Unterstützung benötigen, erreichen Sie uns von Montag bis Freitag zwischen 08:00 Uhr bis 20:00 Uhr und Samstag von 08:00 Uhr bis 16:00 Uhr direkt unter der kostenfreien Rufnummer 0800 5544 300. Halten Sie hierzu Ihre Abuse-ID und Zugangsnummer, welche Sie im Betreff finden, bereit. esetlog: Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=init # utc_time=2016-04-02 10:15:58 # local_time=2016-04-02 12:15:58 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT Update Init Update Download Update Finalize Updated modules version: 28872 # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=updated # utc_time=2016-04-02 10:18:35 # local_time=2016-04-02 12:18:35 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=init # utc_time=2016-04-02 11:57:25 # local_time=2016-04-02 01:57:25 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT Update Init Update Download esets_scanner_update returned -1 esets_gle=53251 Update Finalize Updated modules version: 28872 # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=updated # utc_time=2016-04-02 11:57:58 # local_time=2016-04-02 01:57:58 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7777 # api_version=3.1.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # engine=28872 # end=stopped # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=true # antistealth_checked=true # utc_time=2016-04-02 12:02:48 # local_time=2016-04-02 02:02:48 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1031 # osver=6.1.7600 NT # compatibility_mode_1='' # compatibility_mode=5893 16776574 66 85 14925634 211228418 0 0 # scanned=18322 # found=737 # cleaned=0 # scan_time=289 sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R0DDI0B.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R0L4S69.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R121VNL.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R136TZI.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R1LX4OJ.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R30ZRAP.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R3DIC3G.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R3FPFGH.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4O0FHJ.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4QZYNT.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4ZM7JU.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R5QSRZ3.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R61RRAO.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R65FZQL.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R69XQC4.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R6UU292.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7I6NE3.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7QEV7B.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7RWTBD.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R8MYZXH.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R95S2MP.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R98T9AP.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9G1GN3.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9N8TVL.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9V1YAT.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9WM0LQ.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RAF7DAC.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RCCABQH.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RE1FCWX.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$REWM0IC.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RFP4HV8.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RFYIWHD.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RG471LH.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RG4EQEG.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RGOWING.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RGQQF2U.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RHD8TRD.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RHYDPGG.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RIXUZK9.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RIZ9PZV.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ81MV4.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ8OUIM.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ9P3KU.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJEMQZK.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RKUE7ZJ.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RKY18CO.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RL0DT80.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLFQYK5.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLHN4G1.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLMEIPT.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLTF02Z.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLTPGWW.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLZBX16.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RMBUCP3.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RMGMXXE.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RN54WJS.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RN79SF8.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RNNC2B3.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RODX2ZG.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$ROJKZ1W.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RPN921C.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RQUQ34C.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RRTZK3T.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RRVSMPE.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSL92MU.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSMTO7E.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSP75U2.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RT01T9W.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RT5ZUOK.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RTILLUZ.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RU11J5B.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RURRJUW.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RUTKKTC.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RUX0VN3.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RV9AOLK.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RW2F9Q2.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RWFMB8N.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RWR5M7A.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RY842PA.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYEPY87.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYJOGZ0.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYNGL1W.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RZC7HO2.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+fnnjm+.txt" |
07.04.2016, 17:14 | #4 |
| Fenster gehen auf esetlog: Code:
ATTFilter sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+alttb+.txt" |
07.04.2016, 17:15 | #5 |
| Fenster gehen auf esetlog: Code:
ATTFilter sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ru-RU\+REcovER+alttb+.txt" ESETSmartInstaller@High as downloader log: all ok # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=init # utc_time=2016-04-02 02:11:47 # local_time=2016-04-02 04:11:47 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT Update Init Update Download Update Finalize Updated modules version: 28875 # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # end=updated # utc_time=2016-04-02 02:12:25 # local_time=2016-04-02 04:12:25 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # osver=6.1.7600 NT # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7777 # api_version=3.1.1 # EOSSerial=4333dd0598bf2d4381803c450f36f1da # engine=28875 # end=stopped # remove_checked=true # archives_checked=false # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2016-04-02 02:56:54 # local_time=2016-04-02 04:56:54 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1031 # osver=6.1.7600 NT # compatibility_mode_1='' # compatibility_mode=5893 16776574 66 85 14936080 211238864 0 0 # scanned=240461 # found=5463 # cleaned=1051 # scan_time=2665 sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+fnnjm+.txt" |
07.04.2016, 17:17 | #6 |
| Fenster gehen auf esetlog: Code:
ATTFilter " ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+dcllf+.txt" |
07.04.2016, 17:19 | #7 |
| esetlog esetlog: Code:
ATTFilter mrccache\downloads\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+alttb+.txt" |
07.04.2016, 17:19 | #8 |
| Fenster gehen auf esetlog: Code:
ATTFilter tArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+dcllf+.txt" |
07.04.2016, 17:21 | #9 |
| Fenster gehen auf esetlog: Code:
ATTFilter tArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+dcllf+.txt" Code:
ATTFilter nt Album Viewer\SqmApi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+fnnjm+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+fnnjm+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+fnnjm+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+fnnjm+.txt" |
07.04.2016, 17:22 | #10 |
| Fenster gehen auf esetlog: Code:
ATTFilter ers\Lore\AppData\Local\Microsoft\Windows Live Clie sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+lxnyl+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\BingBarInstallerLogs\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+lxnyl+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+lxnyl+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\mozilla-temp-files\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+lxnyl+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+rrboi+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+rrboi+.txt" |
07.04.2016, 17:23 | #11 |
| Fenster gehen auf esetlog: Code:
ATTFilter ers\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+lxnyl+.txt" |
07.04.2016, 17:23 | #12 |
| Fenster gehen auf esetlog: Code:
ATTFilter ers\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+rrboi+.txt" |
07.04.2016, 17:24 | #13 |
| Fenster gehen auf esetlog: Code:
ATTFilter ers\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+alttb+.txt" |
07.04.2016, 17:25 | #14 |
| Fenster gehen auf esetlog: Code:
ATTFilter rs\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+alttb+.txt" |
07.04.2016, 17:26 | #15 |
| Fenster gehen auf esetlog: Code:
ATTFilter e sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+alttb+.txt" sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+dcllf+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+fnnjm+.txt" sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+lxnyl+.txt" sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+rrboi+.txt" sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42EC1DBC-847D-4925-895F-75583423C66D}\+REcovER+alttb+.txt" sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42EC1DBC-847D-4925-895F-75583423C66D}\+REcovER+fnnjm+.txt" |
Themen zu Fenster gehen auf |
asus, ccsetup, computer, defender, dnsapi.dll, explorer, firewall, flash player, google, helper, home, internet, kaspersky, monitor, neustart, nvidia, programme, realtek, rundll, services.exe, software, svchost.exe, system, total commander, udp, usb, windows, winlogon.exe |