Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Fenster gehen auf

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML

Antwort
Alt 06.04.2016, 18:23   #1
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



Hallo,

Leider habe ich mir was eingefangen...

Würde mich sehr über eure Hilfe freuen.Danke

Problem:

Win7 startet dann werden 6-7 Fenster aufgeklappt

c:\windows\system32\cmd.exe

C:\user\lore\Documents\edbmmp.exe konnte nicht gefunden werden

habe den eset onlinescanner drüberlaufen lassen der hat auch eine Menge gefunden und gelöscht zum beispiel:

+REcover+alttbt+

leider ist das problem nicht behoben die fenstern immer noch auf...

bin dann auf eure Seite gestossen (leider zu spät)

und hoffe nun ihr könnt mir weiterhelfen

vielen dank im voraus

HTML-Code:
 Malwarebytes Anti-Malware 
www.malwarebytes.org

Suchlaufdatum: 06.04.2016
Suchlaufzeit: 17:36
Protokolldatei: malwarebyte.txt
Administrator: Ja

Version: 2.2.1.1043
Malware-Datenbank: v2016.04.06.04
Rootkit-Datenbank: v2016.04.03.01
Lizenz: Testversion
Malware-Schutz: Aktiviert
Schutz vor bösartigen Websites: Aktiviert
Selbstschutz: Deaktiviert

Betriebssystem: Windows 7
CPU: x64
Dateisystem: NTFS
Benutzer: Lore

Suchlauftyp: Bedrohungssuchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 366366
Abgelaufene Zeit: 12 Min., 47 Sek.

Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert

Prozesse: 0
(keine bösartigen Elemente erkannt)

Module: 0
(keine bösartigen Elemente erkannt)

Registrierungsschlüssel: 0
(keine bösartigen Elemente erkannt)

Registrierungswerte: 0
(keine bösartigen Elemente erkannt)

Registrierungsdaten: 0
(keine bösartigen Elemente erkannt)

Ordner: 0
(keine bösartigen Elemente erkannt)

Dateien: 0
(keine bösartigen Elemente erkannt)

Physische Sektoren: 0
(keine bösartigen Elemente erkannt)


(end)

weiter:

Code:
ATTFilter
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.4 (03.14.2016)
Operating System: Windows 7 Home Premium x64 
Ran by Lore (Administrator) on 06.04.2016 at 18:13:40,96
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 9 

Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C5383RO3 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEMSZL02 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA88XOS6 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Lore\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS40ELNT (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\prefetch\GOOGLETOOLBARUSER_32.EXE-34B1B1C5.pf (File) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C5383RO3 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEMSZL02 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA88XOS6 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS40ELNT (Temporary Internet Files Folder) 



Registry: 0 





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 06.04.2016 at 18:14:47,81
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         

weiter:
Code:
ATTFilter
Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:05-03-2016 01
durchgeführt von Lore (Administrator) auf PC-LORE (06-04-2016 18:15:41)
Gestartet von C:\Users\Lore\Desktop
Geladene Profile: UpdatusUser & Lore (Verfügbare Profile: UpdatusUser & Lore)
Platform: Windows 7 Home Premium (X64) Sprache: Deutsch (Deutschland)
Internet Explorer Version 9 (Standard-Browser: IE)
Start-Modus: Normal
Anleitung für Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Prozesse (Nicht auf der Ausnahmeliste) =================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Prozess geschlossen. Die Datei wird nicht verschoben.)

(ASUSTeK Computer Inc.) C:\Windows\System32\FBAgent.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\AsLdrSrv.exe
(ASUS) C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe
(Malwarebytes) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
(Malwarebytes) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
(NVIDIA Corporation) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
(Intel(R) Corporation) C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
(Intel(R) Corporation) C:\Program Files\Intel\TurboBoost\TurboBoost.exe
() C:\ExpressGateUtil\VAWinService.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Intel(R) Corporation) C:\Program Files\Intel\WiFi\bin\EvtEng.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
() C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe


==================== Registry (Nicht auf der Ausnahmeliste) ===========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt. Die Datei wird nicht verschoben.)

HKLM\...\Run: [ASUS WebStorage] => C:\Program Files (x86)\ASUS\ASUS WebStorage\SERVICE\AsusWSService.exe [1754448 2010-03-16] ()
HKLM\...\Run: [IntelTBRunOnce] => wscript.exe //b //nologo "C:\Program Files\Intel\TurboBoost\RunTBGadgetOnce.vbs"
HKLM\...\Run: [RtHDVBg] => C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe [2168424 2010-10-13] (Realtek Semiconductor)
HKLM\...\Run: [IntelWireless] => C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe [1931024 2010-07-20] (Intel(R) Corporation)
HKLM\...\Run: [AmIcoSinglun64] => C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe [324096 2010-05-03] (Alcor Micro Corp.)
HKLM\...\Run: [snp2uvc] => C:\Windows\vsnp2uvc.exe [909824 2010-01-21] (Sonix Technology Co., Ltd.)
HKLM\...\Run: [ETDWare] => C:\Program Files\Elantech\ETDCtrl.exe [649608 2010-06-10] (ELAN Microelectronic Corp.)
HKLM\...\Run: [CDAServer] => C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe [462712 2012-03-09] ()
HKLM-x32\...\Run: [RemoteControl9] => C:\Program Files (x86)\Cyberlink\PowerDVD9\PDVD9Serv.exe [87336 2009-07-07] (CyberLink Corp.)
HKLM-x32\...\Run: [UpdatePSTShortCut] => C:\Program Files (x86)\Cyberlink\DVD Suite\MUITransfer\MUIStartMenu.exe [210216 2010-06-25] (CyberLink Corp.)
HKLM-x32\...\Run: [UpdateLBPShortCut] => C:\Program Files (x86)\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe [222504 2009-05-20] (CyberLink Corp.)
HKLM-x32\...\Run: [UpdateP2GoShortCut] => C:\Program Files (x86)\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe [222504 2009-05-20] (CyberLink Corp.)
HKLM-x32\...\Run: [ATKMEDIA] => C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe [170624 2010-10-08] (ASUS)
HKLM-x32\...\Run: [HControlUser] => C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe [105016 2009-06-19] (ASUS)
HKLM-x32\...\Run: [SonicMasterTray] => C:\Program Files (x86)\ASUS\SonicMaster\SonicMasterTray.exe [984400 2010-07-10] (Virage Logic Corporation / Sonic Focus)
HKLM-x32\...\Run: [Wireless Console 3] => C:\Program Files (x86)\ASUS\Wireless Console 3\wcourier.exe [1601536 2010-09-24] ()
HKLM-x32\...\Run: [VAWinAgent] => C:\ExpressGateUtil\VAWinAgent.exe [21504 2010-08-13] ()
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-861465212-3798714191-455766634-1000\...\Run: [ISUSPM] => C:\ProgramData\FLEXnet\Connect\11\ISUSPM.exe -scheduler
HKU\S-1-5-21-861465212-3798714191-455766634-1000\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2011-02-27] (Google Inc.)
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [Syncables] => C:\Program Files (x86)\syncables\syncables desktop\Syncables.exe [370480 2010-07-19] (syncables, LLC)
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [EEDSpeedLauncher] => rundll32.exe C:\Windows\system32\eed_ec.dll,SpeedLauncher
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vsswudmlt] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqhuuoa] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqmsnco] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssqmewew] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vsshtoxkq] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-21-861465212-3798714191-455766634-1001\...\Run: [vssnjmnky] => C:\Windows\SYSTEM32\CMD.EXE /C START "" "C:\Users\Lore\Documents\edbmmp.exe"
HKU\S-1-5-18\...\Run: [EEDSpeedLauncher] => rundll32.exe C:\Windows\system32\eed_ec.dll,SpeedLauncher
ShellIconOverlayIdentifiers: [AsusWSShellExt_B] -> {6D4133E5-0742-4ADC-8A8C-9303440F7190} => C:\Program Files (x86)\ASUS\ASUS WebStorage\service\AsusWSShellExt64.dll [2009-11-26] (eCareme Technologies, Inc.)
ShellIconOverlayIdentifiers: [AsusWSShellExt_O] -> {64174815-8D98-4CE6-8646-4C039977D808} => C:\Program Files (x86)\ASUS\ASUS WebStorage\service\AsusWSShellExt64.dll [2009-11-26] (eCareme Technologies, Inc.)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\AsusVibeLauncher.lnk [2011-02-27]
ShortcutTarget: AsusVibeLauncher.lnk -> C:\Program Files (x86)\ASUS\AsusVibe\AsusVibeLauncher.exe ()
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\FancyStart daemon.lnk [2011-02-27]
ShortcutTarget: FancyStart daemon.lnk -> C:\Windows\Installer\{2B81872B-A054-48DA-BE3B-FA5C164C303A}\_C4A2FC3E3722966204FDD8.exe ()

==================== Internet (Nicht auf der Ausnahmeliste) ====================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Eintrag entfernt oder auf den Standardwert zurückgesetzt, wenn es sich um einen Registryeintrag handelt.)

Tcpip\Parameters: [DhcpNameServer] 192.168.2.1
Tcpip\..\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}: [DhcpNameServer] 192.168.2.1
Tcpip\..\Interfaces\{C8DBF7B7-D39F-4BD7-9319-C4F7C107E494}: [DhcpNameServer] 192.168.2.1

Internet Explorer:
==================
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com
HKU\S-1-5-21-861465212-3798714191-455766634-1000\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://asus.msn.com
HKU\S-1-5-21-861465212-3798714191-455766634-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://asus.msn.com
HKU\S-1-5-21-861465212-3798714191-455766634-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/
HKU\S-1-5-21-861465212-3798714191-455766634-1001\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://asus.msn.com
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox
SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=ASUTDF&pc=MAAU&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT
SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1000 -> DefaultScope {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT
SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1000 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ASUT
SearchScopes: HKU\S-1-5-21-861465212-3798714191-455766634-1001 -> DefaultScope {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = 
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-22] (Microsoft Corp.)
BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll [2011-02-27] (Google Inc.)
BHO: Google Toolbar Notifier BHO -> {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} -> C:\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\swg64.dll [2011-02-27] (Google Inc.)
BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2010-09-22] (Microsoft Corp.)
BHO-x32: Windows Live Messenger Companion Helper -> {9FDDE16B-836F-4806-AB1F-1455CBEFF289} -> C:\Program Files (x86)\Windows Live\Companion\companioncore.dll [2010-11-10] (Microsoft Corporation)
BHO-x32: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll [2011-02-27] (Google Inc.)
BHO-x32: Google Dictionary Compression sdch -> {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} -> C:\Program Files (x86)\Google\Google Toolbar\Component\fastsearch_B7C5AC242193BB3E.dll [2011-02-27] (Google Inc.)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll [2011-02-27] (Google Inc.)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll [2011-02-27] (Google Inc.)

FireFox:
========
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-14] ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF32.dll [Keine Datei]
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files (x86)\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-14] ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2010-11-10] (Microsoft Corporation)

==================== Dienste (Nicht auf der Ausnahmeliste) ========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

R2 MBAMScheduler; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe [1514464 2016-03-10] (Malwarebytes)
R2 MBAMService; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe [1136608 2016-03-10] (Malwarebytes)
S3 MyWiFiDHCPDNS; C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe [340240 2010-07-20] ()
R3 RichVideo; C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe [244904 2010-04-06] () [Datei ist nicht signiert]
R2 VideAceWindowsService; C:\ExpressGateUtil\VAWinService.exe [77312 2010-08-21] () [Datei ist nicht signiert]
S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2009-07-14] (Microsoft Corporation)

===================== Treiber (Nicht auf der Ausnahmeliste) ==========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

S3 ebdrv; C:\Windows\system32\DRIVERS\evbda.sys [3286016 2009-06-10] (Broadcom Corporation)
R3 FLxHCIh; C:\Windows\System32\DRIVERS\FLxHCIh.sys [81984 2010-10-28] (Fresco Logic)
R3 kbfiltr; C:\Windows\System32\DRIVERS\kbfiltr.sys [15416 2009-07-21] ( )
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [27008 2016-03-10] (Malwarebytes)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [192216 2016-04-06] (Malwarebytes)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [64896 2016-03-10] (Malwarebytes Corporation)
R3 SNP2UVC; C:\Windows\System32\DRIVERS\snp2uvc.sys [1800832 2010-09-07] (Sonix Technology Co., Ltd.)
R2 TurboB; C:\Windows\System32\DRIVERS\TurboB.sys [13832 2010-04-17] ()
U3 tmlwf; kein ImagePath
U3 tmwfp; kein ImagePath

==================== NetSvcs (Nicht auf der Ausnahmeliste) ===================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)


==================== Ein Monat: Erstellte Dateien und Ordner ========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.)

2016-04-06 18:15 - 2016-04-06 18:15 - 00014229 _____ C:\Users\Lore\Desktop\FRST.txt
2016-04-06 18:14 - 2016-04-06 18:15 - 00001949 _____ C:\Users\Lore\Desktop\JRT.txt
2016-04-06 17:59 - 2016-04-06 17:59 - 00000000 ____D C:\Windows\pss
2016-04-06 17:51 - 2016-04-06 17:51 - 00001190 _____ C:\Users\Lore\Desktop\malwarebyte.txt
2016-04-06 17:35 - 2016-04-06 17:35 - 00001104 _____ C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2016-04-06 17:35 - 2016-04-06 17:35 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Malwarebytes Anti-Malware 
2016-04-06 17:35 - 2016-04-06 17:35 - 00000000 ____D C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2016-04-06 17:35 - 2016-03-10 14:09 - 00064896 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2016-04-06 17:35 - 2016-03-10 14:08 - 00027008 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbam.sys
2016-04-06 17:34 - 2016-04-06 17:34 - 01610352 _____ (Malwarebytes) C:\Users\Lore\Desktop\JRT.exe
2016-04-06 17:33 - 2016-04-06 17:33 - 22851472 _____ (Malwarebytes ) C:\Users\Lore\Desktop\mbam-setup-2.2.1.1043.exe
2016-04-04 17:56 - 2016-04-06 18:15 - 00000000 ____D C:\FRST
2016-04-04 17:56 - 2016-04-04 17:56 - 02374144 _____ (Farbar) C:\Users\Lore\Desktop\FRST64.exe
2016-04-04 17:50 - 2016-04-04 17:50 - 01610352 _____ (Malwarebytes) C:\Users\Lore\Downloads\JRT.exe
2016-04-04 17:48 - 2016-04-04 17:49 - 00200442 _____ C:\TDSSKiller.3.1.0.9_04.04.2016_17.48.13_log.txt
2016-04-04 17:48 - 2016-04-04 17:48 - 04727984 _____ (Kaspersky Lab ZAO) C:\Users\Lore\Downloads\tdsskiller.exe
2016-04-02 15:39 - 2016-04-02 15:39 - 06823393 _____ C:\Users\Lore\Downloads\ccsetup516.zip
2016-04-02 15:02 - 2016-04-02 15:02 - 00000000 ____D C:\Users\Lore\AppData\Local\GHISLER
2016-04-02 14:53 - 2016-04-02 14:53 - 00000584 _____ C:\Users\Lore\Desktop\Total Commander 64 bit.lnk
2016-04-02 14:53 - 2016-04-02 14:53 - 00000574 _____ C:\Users\Lore\Desktop\Total Commander.lnk
2016-04-02 14:53 - 2016-04-02 14:53 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Total Commander
2016-04-02 14:53 - 2016-04-02 14:53 - 00000000 ____D C:\Users\Lore\AppData\Roaming\GHISLER
2016-04-02 14:52 - 2016-04-02 14:52 - 06391912 _____ (Ghisler Software GmbH) C:\Users\Lore\Downloads\tcmd852ax32_64.exe
2016-04-02 14:21 - 2016-04-06 18:02 - 00192216 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2016-04-02 14:21 - 2016-04-06 17:35 - 00000000 ____D C:\ProgramData\Malwarebytes
2016-04-02 14:21 - 2016-04-03 11:56 - 00000000 ____D C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2016-04-02 14:20 - 2016-03-10 14:08 - 00140672 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbamchameleon.sys
2016-04-02 14:18 - 2016-04-02 14:19 - 16563352 _____ (Malwarebytes Corp.) C:\Users\Lore\Downloads\mbar-1.09.3.1001.exe
2016-04-02 12:15 - 2016-04-02 12:15 - 00000000 ____D C:\Program Files (x86)\ESET
2016-04-02 12:10 - 2016-04-02 12:15 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+lxnyl+.html
2016-04-02 12:08 - 2016-04-02 12:15 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.html
2016-04-02 12:07 - 2016-04-06 18:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Mozilla
2016-04-02 12:02 - 2016-04-02 12:02 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+dcllf+.html
2016-04-02 12:00 - 2016-04-02 16:10 - 00000000 ____D C:\AdwCleaner
2016-04-02 11:43 - 2016-04-02 11:46 - 92986584 _____ (PortableApps.com) C:\Users\Lore\Downloads\firefoxportable_45.0.1_german.paf.exe
2016-04-02 11:39 - 2016-04-02 11:42 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+fnnjm+.html
2016-04-02 11:38 - 2016-04-02 11:42 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.html
2016-04-01 18:09 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\+REcovER+alttb+.html
2016-04-01 18:09 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+alttb+.html
2016-04-01 18:07 - 2016-04-01 18:12 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+alttb+.html
2016-03-30 18:44 - 2016-03-30 18:50 - 00006594 _____ C:\Users\Lore\AppData\LocalLow\+REcovER+rrboi+.html
2016-03-30 18:42 - 2016-03-30 18:50 - 00006594 _____ C:\Users\Lore\AppData\Local\+REcovER+rrboi+.html
2016-03-30 17:13 - 2016-03-30 17:13 - 00006594 _____ C:\Users\+REcovER+nbwjb+.html

==================== Ein Monat: Geänderte Dateien und Ordner ========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Datei/der Ordner verschoben.)

2016-04-06 18:07 - 2009-07-14 06:45 - 00010016 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2016-04-06 18:07 - 2009-07-14 06:45 - 00010016 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2016-04-06 18:03 - 2014-06-09 18:12 - 00000884 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job
2016-04-06 18:00 - 2009-07-14 07:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2016-04-06 17:55 - 2011-02-27 08:07 - 00001278 _____ C:\Windows\system32\ServiceFilter.ini
2016-04-06 17:28 - 2011-02-27 08:16 - 00045056 _____ C:\Windows\system32\acovcnt.exe
2016-04-04 18:34 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\inf
2016-04-03 12:01 - 2009-08-04 11:51 - 00654400 _____ C:\Windows\system32\perfh007.dat
2016-04-03 12:01 - 2009-08-04 11:51 - 00130240 _____ C:\Windows\system32\perfc007.dat
2016-04-03 12:01 - 2009-07-14 07:13 - 01498742 _____ C:\Windows\system32\PerfStringBackup.INI
2016-04-03 11:58 - 2011-04-18 17:10 - 00000000 ____D C:\Users\Lore\AppData\Local\Windows Live
2016-04-02 17:49 - 2011-04-18 17:07 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Windows Live Writer
2016-04-02 17:49 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Zeon
2016-04-02 17:48 - 2015-04-06 11:03 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Samsung
2016-04-02 17:48 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Nuance
2016-04-02 17:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CyberLink Blu-ray Disc Suite
2016-04-02 17:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ASUS Video Magic
2016-04-02 17:46 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Lore\AppData\Roaming\CyberLink
2016-04-02 17:46 - 2011-04-16 15:21 - 00000000 ____D C:\Users\Lore\AppData\Roaming\FLEXnet
2016-04-02 17:46 - 2011-04-16 13:27 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Macromedia
2016-04-02 17:46 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Intel
2016-04-02 17:46 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Asus WebStorage
2016-04-02 17:46 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Media Center Programs
2016-04-02 17:45 - 2011-04-16 13:27 - 00000000 ____D C:\Users\Lore\AppData\Roaming\Adobe
2016-04-02 17:44 - 2012-01-20 16:53 - 00000000 ____D C:\Users\Lore\AppData\LocalLow\Adobe
2016-04-02 17:44 - 2011-04-18 17:07 - 00000000 ____D C:\Users\Lore\AppData\Local\Windows Live Writer
2016-04-02 17:44 - 2011-04-16 13:26 - 00000000 ____D C:\Users\Lore\AppData\LocalLow\Google
2016-04-02 16:53 - 2011-02-27 08:13 - 00000000 ___HD C:\ExpressGateUtil
2016-04-02 16:48 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Local\VirtualStore
2016-04-02 16:47 - 2011-08-12 13:45 - 00000000 ____D C:\Users\Lore\AppData\Local\Microsoft Games
2016-04-02 16:47 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore\AppData\Local\Power2Go
2016-04-02 16:36 - 2011-04-16 13:26 - 00000000 ____D C:\Users\Lore\AppData\Local\Google
2016-04-02 16:35 - 2015-12-23 15:08 - 00000000 ____D C:\Users\Lore\AppData\Local\CEF
2016-04-02 16:35 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Lore\AppData\Local\Cyberlink
2016-04-02 16:34 - 2011-04-16 15:23 - 00000000 ____D C:\Users\Lore\AppData\Local\ASUS
2016-04-02 16:32 - 2014-06-16 13:19 - 00000000 ____D C:\Users\Lore\AppData\Local\Adobe
2016-04-02 16:27 - 2009-07-14 05:20 - 00000000 __RHD C:\Users\Public\Libraries
2016-04-02 16:07 - 2015-04-06 11:06 - 00000000 ____D C:\ProgramData\boost_interprocess
2016-04-02 16:07 - 2012-01-20 16:50 - 00000000 ____D C:\ProgramData\Adobe
2016-04-02 16:07 - 2011-06-16 18:31 - 00000000 ___HD C:\ProgramData\.syncID
2016-04-02 16:07 - 2011-06-16 18:31 - 00000000 ___HD C:\ProgramData\.Syncables
2016-04-02 16:07 - 2011-04-18 17:21 - 00000000 ___HD C:\ProgramData\CanonBJ
2016-04-02 16:07 - 2011-04-16 15:23 - 00000000 ____D C:\ProgramData\ASUS
2016-04-02 16:07 - 2011-02-27 08:02 - 00000000 ____D C:\ProgramData\AmUStor
2016-04-02 16:07 - 2011-02-27 07:57 - 00000000 ____D C:\ProgramData\Intel
2016-04-02 16:07 - 2011-02-27 07:55 - 00000000 ____D C:\ProgramData\NVIDIA
2016-04-02 16:07 - 2011-02-27 07:54 - 00000000 ____D C:\ProgramData\NVIDIA Corporation
2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Nuance
2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Google
2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\FLEXnet
2016-04-02 16:07 - 2011-02-27 07:32 - 00000000 ____D C:\ProgramData\Downloaded Installations
2016-04-02 16:07 - 2011-02-27 07:25 - 00000000 ____D C:\ProgramData\CyberLink
2016-04-02 16:01 - 2011-02-27 08:05 - 00000000 ____D C:\ProgramData\P4G
2016-04-02 16:01 - 2011-02-27 07:44 - 00000000 ____D C:\ProgramData\OberonGameConsole
2016-04-02 16:00 - 2015-04-06 11:01 - 00000000 ____D C:\ProgramData\Samsung
2016-04-02 15:59 - 2011-02-27 07:58 - 00000000 ____D C:\ProgramData\SonicFocus
2016-04-02 15:58 - 2011-02-27 07:25 - 00000000 ____D C:\ProgramData\Temp
2016-04-02 15:42 - 2011-09-01 14:19 - 00000000 ____D C:\Windows\Minidump
2016-04-02 15:42 - 2009-07-29 08:03 - 00000000 ____D C:\Windows\Panther
2016-04-02 15:36 - 2011-04-29 15:28 - 00000000 ____D C:\Users\Public\CyberLink
2016-04-02 15:36 - 2009-07-14 09:44 - 00000000 ___RD C:\Users\Public\Recorded TV
2016-04-02 14:48 - 2009-07-14 05:20 - 00000000 ____D C:\Windows\SchCache
2016-04-02 14:03 - 2011-02-27 07:01 - 00000000 ____D C:\eSupport
2016-04-02 13:54 - 2015-04-06 12:10 - 00000000 ____D C:\scanner
2016-04-02 13:54 - 2011-02-27 07:48 - 00000000 ____D C:\Intel
2016-04-02 13:53 - 2012-01-20 17:11 - 00000000 ____D C:\seraphin
2016-04-02 13:53 - 2011-02-27 07:45 - 00000000 ____D C:\AsusVibeData
2016-04-02 13:52 - 2011-04-16 13:15 - 00000000 ____D C:\Users\Lore\Documents\ASUS WebStorage
2016-04-02 13:51 - 2015-04-06 12:17 - 00000000 ____D C:\Users\Lore\Documents\Scan
2016-04-02 13:51 - 2015-04-06 11:41 - 00000000 ___RD C:\Users\Lore\Documents\Scanned Documents
2016-04-02 13:51 - 2011-04-29 16:24 - 00000000 ____D C:\Users\Lore\Documents\My Weblog Posts
2016-04-02 13:51 - 2011-04-16 15:23 - 00000000 ____D C:\Users\Lore\Documents\ASUS
2016-04-02 13:50 - 2015-04-06 12:23 - 00169984 ___SH C:\Users\Lore\Documents\Thumbs.db
2016-04-02 13:50 - 2015-04-06 11:41 - 00000000 ____D C:\Users\Lore\Documents\Fax
2016-04-02 13:49 - 2015-04-06 11:12 - 00146944 ___SH C:\Users\Lore\Thumbs.db
2016-04-02 13:49 - 2011-04-16 13:13 - 00000000 ____D C:\Users\Lore
2016-04-02 13:07 - 2011-04-16 13:13 - 00000000 ___HD C:\ASUS.DAT
2016-04-02 12:15 - 2011-02-27 07:32 - 00000000 ____D C:\Program Files (x86)\Google
2016-03-30 17:13 - 2011-04-16 14:25 - 00000464 _____ C:\BurnHelp.txt
2016-03-30 17:13 - 2011-02-27 08:24 - 00016384 _____ C:\devlist.txt
2016-03-30 17:13 - 2009-07-29 08:03 - 00008576 ___SH C:\BOOTSECT.BAK
2016-03-25 19:03 - 2014-06-09 18:12 - 00797376 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2016-03-25 19:03 - 2014-06-09 18:12 - 00142528 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2016-03-25 19:03 - 2014-06-09 18:12 - 00003822 _____ C:\Windows\System32\Tasks\Adobe Flash Player Updater

==================== Dateien im Wurzelverzeichnis einiger Verzeichnisse =======

2016-04-01 18:09 - 2016-04-01 18:12 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+alttb+.html
2016-04-01 18:09 - 2016-04-01 18:12 - 0107536 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+alttb+.png
2016-04-02 11:40 - 2016-04-02 11:43 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+fnnjm+.html
2016-04-02 11:40 - 2016-04-02 11:43 - 0106921 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+fnnjm+.png
2016-04-02 12:12 - 2016-04-02 12:16 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+lxnyl+.html
2016-04-02 12:12 - 2016-04-02 12:16 - 0107085 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+lxnyl+.png
2016-03-30 18:45 - 2016-03-30 18:51 - 0006594 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+rrboi+.html
2016-03-30 18:45 - 2016-03-30 18:51 - 0107425 _____ () C:\Users\Lore\AppData\Roaming\Microsoft\+REcovER+rrboi+.png
2016-04-01 18:07 - 2016-04-01 18:12 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+alttb+.html
2016-04-01 18:07 - 2016-04-01 18:12 - 0107536 _____ () C:\Users\Lore\AppData\Local\+REcovER+alttb+.png
2016-04-02 12:02 - 2016-04-02 12:02 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+dcllf+.html
2016-04-02 12:02 - 2016-04-02 12:02 - 0107326 _____ () C:\Users\Lore\AppData\Local\+REcovER+dcllf+.png
2016-04-02 11:38 - 2016-04-02 11:42 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.html
2016-04-02 11:38 - 2016-04-02 11:42 - 0106921 _____ () C:\Users\Lore\AppData\Local\+REcovER+fnnjm+.png
2016-04-02 12:08 - 2016-04-02 12:15 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.html
2016-04-02 12:08 - 2016-04-02 12:15 - 0107085 _____ () C:\Users\Lore\AppData\Local\+REcovER+lxnyl+.png
2016-03-30 18:42 - 2016-03-30 18:50 - 0006594 _____ () C:\Users\Lore\AppData\Local\+REcovER+rrboi+.html
2016-03-30 18:42 - 2016-03-30 18:50 - 0107425 _____ () C:\Users\Lore\AppData\Local\+REcovER+rrboi+.png
2011-02-27 07:44 - 2010-07-07 02:10 - 0131472 _____ () C:\ProgramData\FullRemove.exe
2011-02-27 07:30 - 2011-02-27 07:30 - 0000109 _____ () C:\ProgramData\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}.log
2011-02-27 07:31 - 2011-02-27 07:32 - 0000105 _____ () C:\ProgramData\{40BF1E83-20EB-11D8-97C5-0009C5020658}.log
2011-02-27 07:29 - 2011-02-27 07:30 - 0000106 _____ () C:\ProgramData\{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}.log
2011-02-27 07:31 - 2011-02-27 07:31 - 0000107 _____ () C:\ProgramData\{C59C179C-668D-49A9-B6EA-0121CCFC1243}.log
2011-02-27 07:26 - 2011-02-27 07:29 - 0000110 _____ () C:\ProgramData\{CB099890-1D5F-11D5-9EA9-0050BAE317E1}.log
2011-02-27 07:30 - 2011-02-27 07:30 - 0000105 _____ () C:\ProgramData\{d36dd326-7280-11d8-97c8-000129760cbe}.log
2011-02-27 07:25 - 2011-02-27 07:26 - 0000115 _____ () C:\ProgramData\{E3739848-5329-48E3-8D28-5BBD6E8BE384}.log

==================== Bamital & volsnap =================

(Es ist kein automatischer Fix für Dateien vorhanden, die an der Verifikation gescheitert sind.)

C:\Windows\system32\winlogon.exe => Datei ist digital signiert
C:\Windows\system32\wininit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\wininit.exe => Datei ist digital signiert
C:\Windows\explorer.exe => Datei ist digital signiert
C:\Windows\SysWOW64\explorer.exe => Datei ist digital signiert
C:\Windows\system32\svchost.exe => Datei ist digital signiert
C:\Windows\SysWOW64\svchost.exe => Datei ist digital signiert
C:\Windows\system32\services.exe => Datei ist digital signiert
C:\Windows\system32\User32.dll => Datei ist digital signiert
C:\Windows\SysWOW64\User32.dll => Datei ist digital signiert
C:\Windows\system32\userinit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\userinit.exe => Datei ist digital signiert
C:\Windows\system32\rpcss.dll => Datei ist digital signiert
C:\Windows\system32\dnsapi.dll => Datei ist digital signiert
C:\Windows\SysWOW64\dnsapi.dll => Datei ist digital signiert
C:\Windows\system32\Drivers\volsnap.sys => Datei ist digital signiert


LastRegBack: 2016-03-29 12:39

==================== Ende von FRST.txt ============================
         

weiter:

Code:
ATTFilter
Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version:05-03-2016 01
durchgeführt von Lore (2016-04-06 18:16:10)
Gestartet von C:\Users\Lore\Desktop
Windows 7 Home Premium (X64) (2011-04-16 11:13:06)
Start-Modus: Normal
==========================================================


==================== Konten: =============================

Administrator (S-1-5-21-861465212-3798714191-455766634-500 - Administrator - Disabled)
Gast (S-1-5-21-861465212-3798714191-455766634-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-861465212-3798714191-455766634-1003 - Limited - Enabled)
Lore (S-1-5-21-861465212-3798714191-455766634-1001 - Administrator - Enabled) => C:\Users\Lore
UpdatusUser (S-1-5-21-861465212-3798714191-455766634-1000 - Limited - Enabled) => C:\Users\UpdatusUser

==================== Sicherheits-Center ========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.)

AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

==================== Installierte Programme ======================

(Nur Adware-Programme mit dem Zusatz "Hidden" können in die Fixlist aufgenommen werden, um sie sichtbar zu machen. Die Adware-Programme sollten manuell deinstalliert werden.)

Adobe Flash Player 10 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 10.0.32.18 - Adobe Systems Incorporated)
Adobe Flash Player 21 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 21.0.0.197 - Adobe Systems Incorporated)
Alcor Micro USB Card Reader (HKLM-x32\...\InstallShield_{1F7424F8-F992-48BC-90EF-7C4DB0405E3F}) (Version: 1.7.17.25416 - Alcor Micro Corp.)
Alcor Micro USB Card Reader (x32 Version: 1.7.17.25416 - Alcor Micro Corp.) Hidden
ASUS AI Recovery (HKLM-x32\...\{38253529-D97D-4901-AE53-5CC9736D3A2E}) (Version: 1.0.13 - ASUS)
ASUS FancyStart (HKLM-x32\...\{2B81872B-A054-48DA-BE3B-FA5C164C303A}) (Version: 1.0.8 - ASUSTeK Computer Inc.)
ASUS LifeFrame3 (HKLM-x32\...\{1DBD1F12-ED93-49C0-A7CC-56CBDE488158}) (Version: 3.0.20 - ASUS)
ASUS Live Update (HKLM-x32\...\{E657B243-9AD4-4ECC-BE81-4CCF8D667FD0}) (Version: 2.5.9 - ASUS)
ASUS Power4Gear Hybrid (HKLM\...\{9B6239BF-4E85-4590-8D72-51E30DB1A9AA}) (Version: 1.1.43 - ASUS)
ASUS SmartLogon (HKLM-x32\...\{64452561-169F-4A36-A2FF-B5E118EC65F5}) (Version: 1.0.0008 - ASUS)
ASUS Splendid Video Enhancement Technology (HKLM-x32\...\{0969AF05-4FF6-4C00-9406-43599238DE0D}) (Version: 1.02.0030 - ASUS)
ASUS Video Magic (HKLM-x32\...\InstallShield_{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}) (Version: 6.0.4015 - CyberLink Corp.)
ASUS Video Magic (x32 Version: 6.0.4015 - CyberLink Corp.) Hidden
ASUS Virtual Camera (HKLM-x32\...\{EC8BD21F-0CA0-4BBF-97D9-4A52B30041A1}) (Version: 1.0.20 - asus)
ASUS WebStorage (HKLM-x32\...\ASUS WebStorage) (Version: 2.0.46.1429 - eCareme Technologies, Inc.)
ASUS_N3_Series (HKLM-x32\...\ASUS_N3_Series) (Version: 1.0.0001 - ASUS)
AsusVibe2.0 (HKLM-x32\...\Asus Vibe2.0) (Version: 2.0.3.585 - ASUSTEK)
ATK Package (HKLM-x32\...\{AB5C933E-5C7D-4D30-B314-9C83A49B94BE}) (Version: 1.0.0007 - ASUS)
Benutzerhandbuch anzeigen (HKLM-x32\...\View User Guide) (Version: 3.60.43.0 - )
Bookworm Deluxe (HKLM-x32\...\Bookworm Deluxe) (Version:  - Oberon Media Inc.)
Common Desktop Agent (Version: 1.62.0 - OEM) Hidden
Complément Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Complemento Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Control ActiveX de Windows Live Mesh para conexiones remotas (HKLM-x32\...\{04668DF2-D32F-4555-9C7E-35523DCD6544}) (Version: 15.4.5722.2 - Microsoft Corporation)
Contrôle ActiveX Windows Live Mesh pour connexions à distance (HKLM-x32\...\{55D003F4-9599-44BF-BA9E-95D060730DD3}) (Version: 15.4.5722.2 - Microsoft Corporation)
Controlo ActiveX do Windows Live Mesh para Ligações Remotas (HKLM-x32\...\{E54EEB5D-41ED-40FE-B4A8-8565DB81469B}) (Version: 15.4.5722.2 - Microsoft Corporation)
Cooking Dash (HKLM-x32\...\Cooking Dash) (Version:  - Oberon Media Inc.)
CyberLink LabelPrint (HKLM-x32\...\InstallShield_{C59C179C-668D-49A9-B6EA-0121CCFC1243}) (Version: 2.5.1908 - CyberLink Corp.)
CyberLink MediaShow Espresso (HKLM-x32\...\InstallShield_{E3739848-5329-48E3-8D28-5BBD6E8BE384}) (Version: 5.0.1606_25588 - CyberLink Corp.)
CyberLink PhotoNow (HKLM-x32\...\InstallShield_{D36DD326-7280-11D8-97C8-000129760CBE}) (Version: 1.1.6904 - CyberLink Corp.)
CyberLink Power2Go (HKLM-x32\...\InstallShield_{40BF1E83-20EB-11D8-97C5-0009C5020658}) (Version: 6.1.3602c - CyberLink Corp.)
CyberLink PowerDirector (HKLM-x32\...\InstallShield_{CB099890-1D5F-11D5-9EA9-0050BAE317E1}) (Version: 8.0.2609a - CyberLink Corp.)
CyberLink PowerDVD 9 (HKLM-x32\...\InstallShield_{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}) (Version: 9.0.3009.50 - CyberLink Corp.)
D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
ESET Online Scanner v3 (HKLM-x32\...\ESET Online Scanner) (Version:  - )
ETDWare PS/2-x64 7.0.5.15_WHQL (HKLM\...\Elantech) (Version: 7.0.5.15 - ELAN Microelectronics Corp.)
ExpressGate Cloud (HKLM-x32\...\InstallShield_{499DED08-6FA8-4749-8E94-8526CC9D1CA8}) (Version: 2.1.77.381 - Asus)
ExpressGate Cloud (x32 Version: 2.1.77.381 - Asus) Hidden
Fast Boot (HKLM\...\{13F4A7F3-EABC-4261-AF6B-1317777F0755}) (Version: 1.0.8 - ASUS)
Fresco Logic USB3.0 Host Controller (HKLM\...\{A445B6F1-C69E-4F0F-B3F8-79A5C7A6066B}) (Version: 3.0.108.16 - Fresco Logic Inc.)
Galeria de Fotografias do Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Galería fotográfica de Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Galerie de photos Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Game Park Console (HKLM-x32\...\{E71E60C1-533E-45A5-8D80-E475E88D2B17}_is1) (Version: 6.2.1.1 - Oberon Media, Inc.)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version:  - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.25.5 - Google Inc.) Hidden
Governor of Poker (HKLM-x32\...\Governor of Poker) (Version:  - Oberon Media Inc.)
Hotel Dash Suite Success (HKLM-x32\...\Hotel Dash Suite Success) (Version:  - Oberon Media Inc.)
Intel(R) Control Center (HKLM-x32\...\{F8A9085D-4C7A-41a9-8A77-C8998A96C421}) (Version: 1.2.1.1007 - Intel Corporation)
Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2253 - Intel Corporation)
Intel(R) PROSet/Wireless WiFi Software (HKLM\...\{4327107B-E95E-415C-9194-458FCED6BF12}) (Version: 13.03.0000 - Intel Corporation)
Intel(R) Turbo Boost Technology Monitor (HKLM\...\{39F4C6F9-618A-4E5B-8FB2-6BD661174E32}) (Version: 1.0.400.4 - Intel)
Intel(R) Wireless Display (HKLM\...\{C298FF86-AB23-4B58-AC53-A23383C07B3A}) (Version: 1.2.20.0 - Intel Corporation)
Jewel Quest 3 (HKLM-x32\...\Jewel Quest 3) (Version:  - Oberon Media Inc.)
Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Luxor 3 (HKLM-x32\...\Luxor 3) (Version:  - Oberon Media Inc.)
Mahjongg dimensions (HKLM-x32\...\Mahjongg dimensions) (Version:  - Oberon Media Inc.)
Malwarebytes Anti-Malware Version 2.2.1.1043 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.2.1.1043 - Malwarebytes)
Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Messenger Companion (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Messenger 分享元件 (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Client Profile DEU Language Pack (HKLM\...\Microsoft .NET Framework 4 Client Profile DEU Language Pack) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft Office 2010 (HKLM-x32\...\{95140000-0070-0000-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (HKLM-x32\...\{770657D0-A123-3C07-8E44-1C83EC895118}) (Version: 8.0.50727.4053 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 ATL Update kb973924 - x64 9.0.30729.4148 (HKLM\...\{EE936C7A-EA40-31D5-9B65-8E3E089C3828}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (HKLM-x32\...\{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
MSXML 4.0 SP3 Parser (KB2758694) (HKLM-x32\...\{1D95BA90-F4F8-47EC-A882-441C99D30C1E}) (Version: 4.30.2117.0 - Microsoft Corporation)
MSXML 4.0 SP3 Parser (KB973685) (HKLM-x32\...\{859DFA95-E4A6-48CD-B88E-A3E483E89B44}) (Version: 4.30.2107.0 - Microsoft Corporation)
NVIDIA Graphics Driver 265.96 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver) (Version: 265.96 - NVIDIA Corporation)
Plants vs Zombies (HKLM-x32\...\Plants vs Zombies) (Version:  - Oberon Media Inc.)
Raccolta foto di Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6221 - Realtek Semiconductor Corp.)
Samsung CLX-3300 Series (HKLM-x32\...\Samsung CLX-3300 Series) (Version: 1.20 (18.08.2014) - Samsung Electronics Co., Ltd.)
Samsung Drucker-Diagnose (HKLM-x32\...\Samsung Printer Diagnostics) (Version: 1.0.0.16 - Samsung Electronics Co., Ltd.)
Samsung Easy Document Creator (HKLM-x32\...\Samsung Easy Document Creator) (Version: 1.06.36 (04.07.2014) - Samsung Electronics Co., Ltd.)
Samsung Easy Printer Manager (HKLM-x32\...\Samsung Easy Printer Manager) (Version: 1.05.52.00(11.07.2014) - Samsung Electronics Co., Ltd.)
Samsung Printer Live Update (HKLM-x32\...\Samsung Printer Live Update) (Version: 1.01.00:04(2013-04-22) - Samsung Electronics Co., Ltd.)
Samsung Scan Process Machine (x32 Version: 1.02.07.10 - Samsung Electronics Co., Ltd.) Hidden
SNS Upload for Easy Document Creator (HKLM-x32\...\{B6B5F07C-88D5-49D3-A1A7-A6D4BC37DCCC}) (Version: 1.0.0 - Samsung Electronics Co.,Ltd)
SonicMaster (HKLM-x32\...\{09BCB9CE-964B-4BDA-AE46-B5A0ABEF1D3F}) (Version: 1.00.0000 - Virage Logic, Corp.)
syncables desktop SE (HKLM-x32\...\{341697D8-9923-445E-B42A-529E5A99CB7A}) (Version: 5.5.746.11492 - syncables)
Total Commander 64-bit (Remove or Repair) (HKLM-x32\...\Totalcmd64) (Version: 8.52a - Ghisler Software GmbH)
USB2.0 UVC 2M WebCam (HKLM\...\USB2.0 UVC 2M WebCam) (Version: 5.8.55133.208 - Sonix)
Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3502.0922 - Microsoft Corporation)
Windows Live Mesh - ActiveX-besturingselement voor externe verbindingen (HKLM-x32\...\{C32CE55C-12BA-4951-8797-0967FDEF556F}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{C63A1E60-B6A4-440B-89A5-1FC6E4AC1C94}) (Version: 15.4.5722.2 - Microsoft Corporation)
WinFlash (HKLM-x32\...\{8F21291E-0444-4B1D-B9F9-4370A73E346D}) (Version: 2.31.0 - ASUS)
Wireless Console 3 (HKLM-x32\...\{20FDF948-C8ED-4543-A539-F7F4AEF5AFA2}) (Version: 3.0.19 - ASUS)
World of Goo (HKLM-x32\...\World of Goo) (Version:  - Oberon Media Inc.)
Στοιχείο ελέγχου ActiveX του Windows Live Mesh για απομακρυσμένες συνδέσεις (HKLM-x32\...\{F665F3B8-01B4-46A9-8E47-FF8DC2208C9F}) (Version: 15.4.5722.2 - Microsoft Corporation)
Συλλογή φωτογραφιών του Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
גלריית התמונות של Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
מסייע Messenger (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
פקד ActiveX של Windows Live Mesh עבור חיבורים מרוחקים (HKLM-x32\...\{9D4C7DFA-CBBB-4F06-BDAC-94D831406DF0}) (Version: 15.4.5722.2 - Microsoft Corporation)
適用遠端連線的 Windows Live Mesh ActiveX 控制項 (HKLM-x32\...\{622DE1BE-9EDE-49D3-B349-29D64760342A}) (Version: 15.4.5722.2 - Microsoft Corporation)

==================== Benutzerdefinierte CLSID (Nicht auf der Ausnahmeliste): ==========================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)


==================== Geplante Aufgaben (Nicht auf der Ausnahmeliste) =============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

Task: {18B422C1-88F2-406F-BEAD-9911D08E3599} - System32\Tasks\Adobe Flash Player Updater => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2016-03-25] (Adobe Systems Incorporated)
Task: {33A94633-47CB-4950-A55A-5E198ABDF8B6} - System32\Tasks\ASUS Live Update => C:\Program Files (x86)\ASUS\ASUS Live Update\ALU.exe [2007-11-30] ()
Task: {5ED75220-1579-40FF-A4D6-F38394681CBD} - System32\Tasks\ASUS P4G => C:\Program Files\P4G\BatteryLife.exe [2010-12-02] (ASUS)
Task: {6AC64887-2138-4E44-82CD-9A8379E7774F} - System32\Tasks\ASUS SmartLogon Console Sensor => C:\Program Files (x86)\ASUS\SmartLogon\sensorsrv.exe [2009-07-31] (ASUS)
Task: {6CB2ECF5-D8C1-49D7-AE46-1678881C64C8} - System32\Tasks\ACMON => C:\Program Files (x86)\ASUS\Splendid\ACMON.exe [2010-08-02] (ASUS)
Task: {B59BD459-8D9C-418F-8F28-7AB39030796F} - System32\Tasks\ATKOSD2 => C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe [2010-08-18] (ASUS)

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird die Aufgabe verschoben. Die Datei, die durch die Aufgabe gestartet wird, wird nicht verschoben.)

Task: C:\Windows\Tasks\Adobe Flash Player Updater.job => C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe

==================== Verknüpfungen =============================

(Die Einträge können gelistet werden, um sie zurückzusetzen oder zu entfernen.)

==================== Geladene Module (Nicht auf der Ausnahmeliste) ==============

2010-07-20 02:48 - 2010-07-20 02:48 - 01501696 _____ () C:\Program Files\Common Files\Intel\WirelessCommon\Libeay32.dll
2015-04-06 11:02 - 2012-01-09 13:47 - 00034304 _____ () C:\Windows\System32\sst7clm.dll
2015-02-20 08:01 - 2015-02-20 08:01 - 00022528 _____ () C:\Windows\System32\us001lm.dll
2010-08-21 04:47 - 2010-08-21 04:47 - 00077312 _____ () C:\ExpressGateUtil\VAWinService.exe
2011-02-27 07:26 - 2010-04-06 08:29 - 00244904 _____ () C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe
2010-08-13 03:52 - 2010-08-13 03:52 - 00151552 _____ () C:\ExpressGateUtil\libexpat.dll
2010-08-13 03:52 - 2010-08-13 03:52 - 00057344 _____ () C:\ExpressGateUtil\netProfileDatabase.DLL

==================== Alternate Data Streams (Nicht auf der Ausnahmeliste) =========

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird nur der ADS entfernt.)


==================== Abgesicherter Modus (Nicht auf der Ausnahmeliste) ===================

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Der Wert "AlternateShell" wird wiederhergestellt.)


==================== EXE Verknüpfungen (Nicht auf der Ausnahmeliste) ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt.)


==================== Internet Explorer Vertrauenswürdig/Eingeschränkt ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt.)


==================== Hosts Inhalt: ===============================

(Wenn benötigt kann der Hosts: Schalter in die Fixlist aufgenommen werden um die Hosts Datei zurückzusetzen.)

2009-07-14 04:34 - 2009-06-10 23:00 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts


==================== Andere Bereiche ============================

(Aktuell gibt es keinen automatisierten Fix für diesen Bereich.)

HKU\S-1-5-21-861465212-3798714191-455766634-1001\Control Panel\Desktop\\Wallpaper -> C:\Users\Lore\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg
DNS Servers: 192.168.2.1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 5) (ConsentPromptBehaviorUser: 3) (EnableLUA: 1)
Windows Firewall ist aktiviert.

==================== MSCONFIG/TASK MANAGER Deaktivierte Einträge ==

(Aktuell gibt es keinen automatisierten Fix für diesen Bereich.)

MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+alttb+.html => C:\Windows\pss\+REcovER+alttb+.html.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+alttb+.png => C:\Windows\pss\+REcovER+alttb+.png.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+fnnjm+.html => C:\Windows\pss\+REcovER+fnnjm+.html.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+fnnjm+.png => C:\Windows\pss\+REcovER+fnnjm+.png.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+lxnyl+.html => C:\Windows\pss\+REcovER+lxnyl+.html.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+lxnyl+.png => C:\Windows\pss\+REcovER+lxnyl+.png.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+rrboi+.html => C:\Windows\pss\+REcovER+rrboi+.html.Startup
MSCONFIG\startupfolder: C:^Users^Lore^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^+REcovER+rrboi+.png => C:\Windows\pss\+REcovER+rrboi+.png.Startup
MSCONFIG\startupreg: ASUS Screen Saver Protector => C:\Windows\AsScrPro.exe
MSCONFIG\startupreg: CLMLServer => "C:\Program Files (x86)\CyberLink\Power2Go\CLMLSvc.exe"
MSCONFIG\startupreg: RtHDVCpl => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe -s

==================== Firewall Regeln (Nicht auf der Ausnahmeliste) ===============

(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)

FirewallRules: [{9A56C898-3437-47F7-866F-4F59663E8E16}] => (Allow) C:\Program Files (x86)\Cyberlink\PowerDVD9\PowerDVD Cinema\PowerDVDCinema.exe
FirewallRules: [{94FC241D-7798-42C1-B99C-3AB10E193FCA}] => (Allow) C:\Program Files (x86)\Cyberlink\PowerDVD9\PowerDVD9.EXE
FirewallRules: [{7F1156B7-D4E4-4DE0-929E-27A65F92CDC8}] => (Allow) C:\Program Files (x86)\Windows Live\Contacts\wlcomm.exe
FirewallRules: [{08C25A66-BA1B-48D1-B309-D130D25D908E}] => (Allow) LPort=2869
FirewallRules: [{F55014D1-F485-47D2-AE53-77A048F2C656}] => (Allow) LPort=1900
FirewallRules: [{E512CE8B-4F23-4577-BCA5-2CCC527DEA79}] => (Allow) C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
FirewallRules: [{FB38ADC7-41A3-43B8-ABCD-F627A560BAFB}] => (Allow) C:\Program Files (x86)\Windows Live\Mesh\MOE.exe
FirewallRules: [{0DBBF01D-CE82-4619-9994-627A234FA6BD}] => (Allow) LPort=5353
FirewallRules: [{B5062EBC-D402-47B5-84C3-E5E0987A22B4}] => (Allow) LPort=8182
FirewallRules: [{E85C80A9-A868-4DB9-8E2B-31A07102BD83}] => (Allow) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
FirewallRules: [{3D9B3A02-4823-4E21-B96C-919B3F488FBC}] => (Allow) C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
FirewallRules: [{07D5AF4D-D634-410A-B2E7-50B9EDF91173}] => (Allow) C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe
FirewallRules: [{524AB061-0AFE-4E1E-A470-200B3204AAF3}] => (Allow) C:\Program Files (x86)\Intel Corporation\Intel Wireless Display\WiDiApp.exe
FirewallRules: [TCP Query User{F9E27637-7BF9-4C64-A6DE-8522F4A8A26B}C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe] => (Block) C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe
FirewallRules: [UDP Query User{2F87361B-5AD1-485F-A3DF-80C12321D238}C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe] => (Block) C:\program files (x86)\syncables\syncables desktop\jre\bin\javaw.exe
FirewallRules: [{A8641B3D-912C-4CC8-9F23-75E2CAE65242}] => (Allow) C:\Windows\twain_32\Samsung\CLX3300\SCNSearch\USDAgent.exe
FirewallRules: [{28129072-FAE4-4EF1-B403-24A53CD8F66E}] => (Allow) C:\Windows\twain_32\Samsung\CLX3300\SCNSearch\USDAgent.exe
FirewallRules: [{6FDC59D2-7E38-4D8C-87A3-6DF8B112F952}] => (Allow) C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe
FirewallRules: [{B82FF021-2FEB-41A7-93BB-360F62226A41}] => (Allow) C:\Program Files\Common Files\Common Desktop Agent\CDASrv.exe
FirewallRules: [{CC716F0D-39D5-492D-B92E-F82036F93C8E}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDS.Application.exe
FirewallRules: [{5C6AD80B-65EA-4FE1-BE12-89864A4BD28B}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDS.Application.exe
FirewallRules: [{0ECD3AAF-4805-40A0-81B2-5DD6511F4E9C}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\OrderSupplies.exe
FirewallRules: [{37946A12-6799-4068-8C9C-2F371A0669CC}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\OrderSupplies.exe
FirewallRules: [{44C1EE75-E52F-4CE5-8A1C-7DA042DD7F5C}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDSAlert.exe
FirewallRules: [{0F091ABD-64E5-4BD9-8B6C-B1B78B215060}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\IDSAlert.exe
FirewallRules: [{F5B32274-32BC-47C8-86BD-9035BEB7C543}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\uninstall.exe
FirewallRules: [{75847770-1B75-4DDF-AA8C-5566EAB5BD81}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\uninstall.exe
FirewallRules: [{62FF86CA-4772-4A3A-947B-B412C56F73A2}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\CDAS2PC.exe
FirewallRules: [{5A4FA488-ACFC-4A90-A4E8-87C2F581B4B3}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\CDAS2PC.exe
FirewallRules: [{B0AAC36A-7648-443F-AEB2-0D0765B9A687}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\ScanProcess.exe
FirewallRules: [{03573C92-F49B-4812-A657-01EDAB5EBFEE}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\ScanProcess.exe
FirewallRules: [{2E73B985-90D5-4BEE-A880-D2EF7EE5CE29}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\Scan2PCNotify.exe
FirewallRules: [{513EE3FD-DBD4-4E67-86E5-891A178914E5}] => (Allow) C:\Program Files (x86)\Samsung\Easy Printer Manager\CDAS2PC\Scan2PCNotify.exe
FirewallRules: [{9C1FC8D9-232F-48AE-901D-7FD6C1C97AFF}] => (Allow) C:\Program Files (x86)\Common Files\Common Desktop Agent\CDASrv.exe
FirewallRules: [{C13A0221-B338-4185-8E24-C9F7DE4DF75E}] => (Allow) C:\Program Files (x86)\Common Files\Common Desktop Agent\CDASrv.exe
FirewallRules: [TCP Query User{E0D6761F-7E0F-4B37-8425-3D4EDD7DB012}C:\program files (x86)\samsung\easy document creator\edc.exe] => (Allow) C:\program files (x86)\samsung\easy document creator\edc.exe
FirewallRules: [UDP Query User{83C54A3D-15B9-4A6F-985F-CDC831B5961D}C:\program files (x86)\samsung\easy document creator\edc.exe] => (Allow) C:\program files (x86)\samsung\easy document creator\edc.exe

==================== Wiederherstellungspunkte =========================

02-04-2016 14:47:02 Malwarebytes Anti-Rootkit Restore Point
04-04-2016 17:50:56 JRT Pre-Junkware Removal
06-04-2016 18:13:42 JRT Pre-Junkware Removal

==================== Fehlerhafte Geräte im Gerätemanager =============


==================== Fehlereinträge in der Ereignisanzeige: =========================

Applikationsfehler:
==================
Error: (04/06/2016 05:49:19 PM) (Source: SideBySide) (EventID: 80) (User: )
Description: Fehler beim Generieren des Aktivierungskontexts für "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest1". Fehler in
Manifest- oder Richtliniendatei "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest2" in Zeile C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest3.
Eine für die Anwendung erforderliche Komponentenversion steht in Konflikt mit
einer anderen, bereits aktiven Komponentenversion.
In Konflikt stehende Komponenten:.
Komponente 1: C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest.
Komponente 2: C:\Windows\WinSxS\manifests\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd.manifest.

Error: (04/04/2016 08:21:15 PM) (Source: SideBySide) (EventID: 80) (User: )
Description: Fehler beim Generieren des Aktivierungskontexts für "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest1". Fehler in
Manifest- oder Richtliniendatei "C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest2" in Zeile C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest3.
Eine für die Anwendung erforderliche Komponentenversion steht in Konflikt mit
einer anderen, bereits aktiven Komponentenversion.
In Konflikt stehende Komponenten:.
Komponente 1: C:\Windows\WinSxS\manifests\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_fa62ad231704eab7.manifest.
Komponente 2: C:\Windows\WinSxS\manifests\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7600.16661_none_420fe3fa2b8113bd.manifest.

Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 7010) (User: )
Description: Der Index kann nicht initialisiert werden.

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)

Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3058) (User: )
Description: Die Anwendung kann nicht initialisiert werden.

Kontext: Windows Anwendung

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)

Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3028) (User: )
Description: Das Gatherer-Objekt kann nicht initialisiert werden.

Kontext: Windows Anwendung, SystemIndex Katalog

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)

Error: (04/04/2016 06:34:43 PM) (Source: Windows Search Service) (EventID: 3029) (User: )
Description: Plug-In in <Search.TripoliIndexer> kann nicht initialisiert werden.

Kontext: Windows Anwendung, SystemIndex Katalog

Details:
	Element nicht gefunden.  (HRESULT : 0x80070490) (0x80070490)

Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 3029) (User: )
Description: Plug-In in <Search.JetPropStore> kann nicht initialisiert werden.

Kontext: Windows Anwendung, SystemIndex Katalog

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)

Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 9002) (User: )
Description: Die Eigenschaftenspeicherdaten können von Windows Search nicht geladen werden.

Kontext: Windows Anwendung, SystemIndex Katalog

Details:
	Die Inhaltsindexdatenbank ist fehlerhaft.  (HRESULT : 0xc0041800) (0xc0041800)

Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 7042) (User: )
Description: Windows Search wird aufgrund eines Problems bei der Indizierung The catalog is corrupt beendet.

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)

Error: (04/04/2016 06:34:38 PM) (Source: Windows Search Service) (EventID: 7040) (User: )
Description: Vom Suchdienst wurden beschädigte Datendateien im Index {id=4700} erkannt. Vom Dienst wird versucht, dieses Problem durch Neuerstellung des Indexes automatisch zu beheben.

Details:
	Der Inhaltsindexkatalog ist fehlerhaft.  (HRESULT : 0xc0041801) (0xc0041801)


Systemfehler:
=============
Error: (04/06/2016 06:13:57 PM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: Dienst "NVIDIA Driver Helper Service" wurde unerwartet beendet. Dies ist bereits 1 Mal passiert.

Error: (04/06/2016 05:55:27 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "MBAMScheduler" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (04/06/2016 05:55:27 PM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst MBAMScheduler erreicht.

Error: (04/04/2016 06:34:43 PM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: Der Dienst "Windows Search" wurde unerwartet beendet. Dies ist bereits 1 Mal vorgekommen. Folgende Korrekturmaßnahmen werden in 30000 Millisekunden durchgeführt: Neustart des Diensts.

Error: (04/04/2016 06:34:43 PM) (Source: Service Control Manager) (EventID: 7024) (User: )
Description: Der Dienst "Windows Search" wurde mit folgendem dienstspezifischem Fehler beendet: %%-1073473535.

Error: (04/04/2016 05:51:10 PM) (Source: Service Control Manager) (EventID: 7034) (User: )
Description: Dienst "NVIDIA Driver Helper Service" wurde unerwartet beendet. Dies ist bereits 1 Mal passiert.

Error: (04/03/2016 11:58:07 AM) (Source: DCOM) (EventID: 10005) (User: )
Description: 1053WSearch{7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}

Error: (04/03/2016 11:58:07 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Windows Search" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (04/03/2016 11:58:07 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Windows Search erreicht.

Error: (04/03/2016 11:57:50 AM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: Der Dienst "Windows Search" wurde unerwartet beendet. Dies ist bereits 1 Mal vorgekommen. Folgende Korrekturmaßnahmen werden in 30000 Millisekunden durchgeführt: Neustart des Diensts.


==================== Speicherinformationen =========================== 

Prozessor: Intel(R) Core(TM) i7-2630QM CPU @ 2.00GHz
Prozentuale Nutzung des RAM: 37%
Installierter physikalischer RAM: 4006.71 MB
Verfügbarer physikalischer RAM: 2512.03 MB
Summe virtueller Speicher: 8011.57 MB
Verfügbarer virtueller Speicher: 6401.24 MB

==================== Laufwerke ================================

Drive c: (OS) (Fixed) (Total:149.04 GB) (Free:108.99 GB) NTFS ==>[System mit Startkomponenten (eingeholt von Laufwerk)]
Drive d: (Data) (Fixed) (Total:425.64 GB) (Free:425.18 GB) NTFS

==================== MBR & Partitionstabelle ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 596.2 GB) (Disk ID: 276C3AF5)
Partition 1: (Not Active) - (Size=21.5 GB) - (Type=1C)
Partition 2: (Active) - (Size=149 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=425.6 GB) - (Type=OF Extended)

==================== Ende von Addition.txt ============================
         

Alt 06.04.2016, 20:29   #2
M-K-D-B
/// TB-Ausbilder
 
Fenster gehen auf - Standard

Fenster gehen auf






Mein Name ist Matthias und ich werde dir bei der Bereinigung deines Computers helfen.


Bitte beachte folgende Hinweise:
  • Falls wir Hinweise auf illegal erworbene Software finden, werden wir den Support unterbrechen bis jegliche Art von illegaler Software vom Rechner entfernt wurde.
  • Lies dir die Anleitungen sorgfältig durch. Solltest du Probleme haben, stoppe mit deiner Bearbeitung und beschreibe mir dein Problem so gut es geht.
  • Solltest du mir nicht innerhalb von 3 Tagen antworten, gehe ich davon aus, dass du keine Hilfe mehr benötigst. Dann lösche ich dein Thema aus meinem Abo. Solltest du einmal länger abwesend sein, so gib mir bitte Bescheid!
  • Während der Bereinigung bitte nichts installieren oder deinstallieren, außer ich bitte dich darum!
  • Bitte beachten: Download bei filepony.de: So ladet Ihr unsere Tools richtig!
  • Alle zu verwendenen Programme sind auf dem Desktop abzuspeichern und von dort als Administrator zu starten!



Bitte arbeite alle Schritte in der vorgegebenen Reihefolge nacheinander ab und poste alle Logdateien in CODE-Tags:
So funktioniert es:
Posten in CODE-Tags
Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert deinem Helfer massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu groß für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
  • Markiere das gesamte Logfile (geht meist mit STRG+A) und kopiere es in die Zwischenablage mit STRG+C.
  • Klicke im Editor auf das #-Symbol. Es erscheinen zwei Klammerausdrücke [CODE] [/CODE].
  • Setze den Curser zwischen die CODE-Tags und drücke STRG+V.
  • Klicke aauf Erweitert/Vorschau, um so prüfen, ob du es richtig gemacht hast. Wenn alles stimmt ... auf Antworten.

Danke für deine Mitarbeit!




Du bist mit einem Verschlüsselungstrojaner infiziert. Hast du noch Zugriff auf deine privaten Daten?

Wo ist die Logdatei von ESET?





Scan mit Combofix
WARNUNG an die MITLESER:
Combofix sollte ausschließlich ausgeführt werden, wenn dies von einem Teammitglied angewiesen wurde!

Downloade dir bitte Combofix vom folgenden Downloadspiegel: Link
  • WICHTIG: Speichere Combofix auf deinem Desktop.
  • Deaktiviere bitte alle deine Antivirensoftware sowie Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören. Combofix meckert auch manchmal trotzdem noch, das kannst du dann ignorieren, mir aber bitte mitteilen.
  • Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm.
  • Während Combofix läuft bitte nicht am Computer arbeiten, die Maus bewegen oder ins Combofixfenster klicken!
  • Wenn Combofix fertig ist, wird es ein Logfile erstellen.
  • Bitte poste die C:\Combofix.txt in deiner nächsten Antwort (möglichst in CODE-Tags).
Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten
Es wurde versucht, einen Registrierungsschlüssel einem ungültigen Vorgang zu unterziehen, der zum Löschen markiert wurde.
starte den Rechner einfach neu. Dies sollte das Problem beheben.

__________________


Geändert von M-K-D-B (06.04.2016 um 20:35 Uhr)

Alt 07.04.2016, 17:12   #3
schorschle
 
Fenster gehen auf - Standard

eset logdatei



hallo Matthias,

erstmal besten dank das du mir Hilfst

bilder und videos kann ich nicht öffnen

mails und systemsteuerung komme ich überall rein

habe auch von telekom mail erhalten:
name war richtig adressiert und kundennummer auch ok die sternchen habe ich reinkopiert.
ist das eine ok mail?

Kundennummer: ****************
| Anschlussinhaber: **************

Sehr geehrte Kundin,
sehr geehrter Kunde,

von Sicherheitsexperten haben wir Hinweise erhalten, dass ein Rechner,
der sich über Ihren Internetzugang mit dem Internet verbindet, mit dem
Schadprogramm 'Zeus' (alias 'ZBot') infiziert ist.

Dadurch stellt für Sie zur Zeit jeder Online-Einkauf, jeder
Geldtransfer per Online-Banking und jeder Austausch in sozialen
Netzwerken ein erhebliches Sicherheitsrisiko dar.

Die folgende IP-Adresse war zu dem genannten Zeitpunkt Ihnen zugeordnet:

IP-Adresse: *************
Zeitangaben: 05.04.2016, 18:23:53 (MESZ)

Wir empfehlen Ihnen jetzt folgende Schritte:

Schadprogramm beseitigen

Damit Sie die Infektion einfach erkennen und entfernen können, bieten
wir Ihnen in Kooperation mit dem Bundesamt für Sicherheit in der
Informationstechnik (BSI) und dem Verband der Informationswirtschaft
(eco) eine kostenfreie Software an. Diesen "EU-Cleaner" können Sie
unter https://www.botfrei.de/telekom herunterladen.

Passwörter ändern

Ändern Sie dann alle Passwörter:
- das 'Persönliche Kennwort' (für die Einwahl ins Internet)
- das 'Passwort' (für das E-Mail- und Kundencenter)
- das 'E-Mail-Passwort' (für E-Mail Programme, wie z.B. Microsoft
Outlook)
für die Dienste der Deutschen Telekom. Dies können Sie zentral im
Kundencenter unter
https://kundencenter.telekom.de/kundencenter/kundendaten/passwoerter
tätigen. Vergessen Sie nicht etwaige Passwörter für Onlinebanking,
eBay, Amazon, Paypal und so weiter, falls Sie solche Dienste nutzen.

Die Reihenfolge ist wichtig, da die neuen Passwörter sonst direkt
wieder von Dritten ausgelesen werden könnten, wenn eine vorhandene
Schadsoftware nicht zuvor entfernt wurde.

Wenn Sie hierbei Unterstützung benötigen, erreichen Sie uns von Montag
bis Freitag zwischen 08:00 Uhr bis 20:00 Uhr und Samstag von 08:00 Uhr
bis 16:00 Uhr direkt unter der kostenfreien Rufnummer 0800 5544 300.
Halten Sie hierzu Ihre Abuse-ID und Zugangsnummer, welche Sie im
Betreff finden, bereit.


esetlog:
Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=init
# utc_time=2016-04-02 10:15:58
# local_time=2016-04-02 12:15:58 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
Update Init
Update Download
Update Finalize
Updated modules version: 28872
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=updated
# utc_time=2016-04-02 10:18:35
# local_time=2016-04-02 12:18:35 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=init
# utc_time=2016-04-02 11:57:25
# local_time=2016-04-02 01:57:25 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
Update Init
Update Download
esets_scanner_update returned -1 esets_gle=53251
Update Finalize
Updated modules version: 28872
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=updated
# utc_time=2016-04-02 11:57:58
# local_time=2016-04-02 01:57:58 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7777
# api_version=3.1.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# engine=28872
# end=stopped
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2016-04-02 12:02:48
# local_time=2016-04-02 02:02:48 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1031
# osver=6.1.7600 NT 
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 66 85 14925634 211228418 0 0
# scanned=18322
# found=737
# cleaned=0
# scan_time=289
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R0DDI0B.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R0L4S69.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R121VNL.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R136TZI.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R1LX4OJ.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R30ZRAP.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R3DIC3G.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R3FPFGH.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4O0FHJ.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4QZYNT.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R4ZM7JU.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R5QSRZ3.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R61RRAO.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R65FZQL.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R69XQC4.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R6UU292.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7I6NE3.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7QEV7B.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R7RWTBD.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R8MYZXH.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R95S2MP.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R98T9AP.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9G1GN3.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9N8TVL.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9V1YAT.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$R9WM0LQ.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RAF7DAC.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RCCABQH.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RE1FCWX.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$REWM0IC.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RFP4HV8.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RFYIWHD.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RG471LH.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RG4EQEG.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RGOWING.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RGQQF2U.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RHD8TRD.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RHYDPGG.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RIXUZK9.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RIZ9PZV.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ81MV4.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ8OUIM.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJ9P3KU.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RJEMQZK.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RKUE7ZJ.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RKY18CO.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RL0DT80.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLFQYK5.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLHN4G1.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLMEIPT.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLTF02Z.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLTPGWW.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RLZBX16.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RMBUCP3.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RMGMXXE.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RN54WJS.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RN79SF8.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RNNC2B3.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RODX2ZG.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$ROJKZ1W.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RPN921C.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RQUQ34C.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RRTZK3T.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RRVSMPE.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSL92MU.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSMTO7E.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RSP75U2.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RT01T9W.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RT5ZUOK.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RTILLUZ.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RU11J5B.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RURRJUW.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RUTKKTC.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RUX0VN3.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RV9AOLK.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RW2F9Q2.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RWFMB8N.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RWR5M7A.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RY842PA.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYEPY87.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYJOGZ0.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RYNGL1W.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\$Recycle.Bin\S-1-5-21-861465212-3798714191-455766634-1001\$RZC7HO2.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NB-NO\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\NL-NL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\PT-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\RU-RU\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\SV-SE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\TR-TR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-CN\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1709v0.0.0l1p-1r1o1\UI\2147483647\ZH-TW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\css\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DA-DK\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\DE-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\EN-US\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ES-ES\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-CA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\FR-FR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\images\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\IT-IT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\JA-JP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\KO-KR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NB-NO\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\NL-NL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\PT-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\RU-RU\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\SV-SE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\TR-TR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-CN\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\LocalHelp\ZH-TW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DA-DK\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\DE-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\EN-US\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ES-ES\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-CA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\FR-FR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+fnnjm+.txt"
         
__________________

Alt 07.04.2016, 17:14   #4
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:
Code:
ATTFilter
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\IT-IT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\JA-JP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\KO-KR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NB-NO\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\NL-NL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\PT-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\RU-RU\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\SV-SE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\TR-TR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-CN\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\Shortcut\ZH-TW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\CFG\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\css\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DA-DK\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\DE-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\EN-US\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ES-ES\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-CA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\FR-FR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\images\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\IT-IT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\JA-JP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\js\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\KO-KR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NB-NO\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\NL-NL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\PT-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\RU-RU\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\SV-SE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\TR-TR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-CN\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1710v0.0.0l1p-1r1o1\WTP\ZH-TW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\util\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ActionHandler\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_BepReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_CfgBroker\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContextMenuHandler\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ContinueBrowsing\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_DisplayErrorMessage\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleChange\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_FeatureToggleIsAbnormal\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Firewall\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ICRCScanConfigChange\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogOnEvent\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_LogPurger\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanComplete\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanMalwareReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSmartScanCheck\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanSpywareReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ManualScanStart\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_MenuHandler\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PasswordProtection\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMAsk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PEMReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PopupActionHandler\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_PreinstallComplete\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyCfg\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ProxyScan\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanMalwareReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RealtimeScanSpywareReport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_RebootPopup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_ResetDefaultConfig\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SessionChanged\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_Startup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_StatusControl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemLocaleChange\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemShutdown\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_SystemStatusChange\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyBeforeDownload\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyProgress\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdateNotifyResult\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1711v0.0.0l1p-1r1o1\Workflow_UpdatePreCheck\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Common\win32\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\OL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\Common\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+alttb+.txt"
         

Alt 07.04.2016, 17:15   #5
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\da-DK\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\en-US\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\es-ES_tradnl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-CA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\fr-FR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\it-IT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ja-JP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ko-KR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nb-NO\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\nl-NL\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\pt-PT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\eSupport\eDriver\Software\TRENDMICRO\UCPlugin\c17t1717v0.0.0l1p1r1o1\Resource\x86\ru-RU\+REcovER+alttb+.txt"
ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=init
# utc_time=2016-04-02 02:11:47
# local_time=2016-04-02 04:11:47 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
Update Init
Update Download
Update Finalize
Updated modules version: 28875
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# end=updated
# utc_time=2016-04-02 02:12:25
# local_time=2016-04-02 04:12:25 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.1.7600 NT 
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7777
# api_version=3.1.1
# EOSSerial=4333dd0598bf2d4381803c450f36f1da
# engine=28875
# end=stopped
# remove_checked=true
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2016-04-02 02:56:54
# local_time=2016-04-02 04:56:54 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1031
# osver=6.1.7600 NT 
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 66 85 14936080 211238864 0 0
# scanned=240461
# found=5463
# cleaned=1051
# scan_time=2665
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\DeviceSync\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\mcepg2-0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\RecoveryTasks\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\eHome\SharedSBE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\PlayReady\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\PublishedData\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\RAC\Temp\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\User Account Pictures\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\DRM\Cache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\AppCrash_NvXDSync.exe_2a5d9f7a322ee2dbffee0b8312d5cf4da494763_17bd012a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0daf190b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dbd72a2\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_0dd9c9d3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\Kernel_0_0_cab_0daf191b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\11.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\Cache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\AnimStamp\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClub\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\ASUS\LifeFrame\PhotoClubFrame\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\CEF\User Data\Dictionaries\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\DEU\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Cyberlink\MediaShow Espresso\promotion\image\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Diagnostics\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Chrome\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Google\Toolbar\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Assistance\Client\1.0\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceInformation\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\DeviceStage\Device\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\de-DE\f319a246-6843-413e-b1a0-7c38903a6fd6\WindowsInformation\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+fnnjm+.txt"
         


Alt 07.04.2016, 17:17   #6
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:
Code:
ATTFilter
" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+dcllf+.txt"
         

Alt 07.04.2016, 17:19   #7
schorschle
 
Fenster gehen auf - Standard

esetlog



esetlog:
Code:
ATTFilter
mrccache\downloads\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Device Metadata\dmrccache\downloads\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\Microsoft-Feeds~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IME12\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP12\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP8_1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\IMJP9_0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\iconcache\nv7g1mk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\IECompatData\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Media Player\Sync Playlists\de-DE\00018880\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Messenger\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\NetTraces\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Photo Acquisition\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_Explorer.EXE_9be1ff637d7468e87e365e9c58f9714048ec2028_11a95292\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_04aca238\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0928f64f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_093305bc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_0f4a366d\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_1089c130\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12ad55ed\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_12c30b27\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_147b8047\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_14f8b941\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_160dd5f5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16a9fff0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_14c6596170ce3c899f95b029f7675ff53e8bd224_16ed8d04\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_049f937b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_08706a1b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1379c3ad\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1aa0e632d691360f191ae9680c791fcf29b3c_1a54389f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_1b71388bc63455ac11b11a9ea4cbf4f9d1ca160_124b3e86\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_090cef4e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_0cef3543\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_126d0924\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_13af5b68\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_28d66bbb975e1c3653aa8616cdcbd1fe32a8f1_17730991\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_43aa5c43209ef26418b8d2f98d5121a2f9260_09a1232a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+alttb+.txt"
         

Alt 07.04.2016, 17:19   #8
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:
Code:
ATTFilter
tArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_595a25aa815ab28c3ccc6c31880a04574af54f8_16e18b01\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_0f191ee8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_11a7a949\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_69a1db366569a3ac6fe48848ddd4a4d4716490_12fde206\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_01dc7d59\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_02f6d1a0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_038f9fb8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_03d260e4\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0493d8b2\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_050ac8da\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_066fee63\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_081be57e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0ef8d538\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_0f564ff3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_100a6f84\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_101d4fa5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_12bfb4dd\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13765907\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_13e8ccd0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_142157cf\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_148d894c\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_14a7c1f7\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15708832\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_15999609\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_1658737a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f09148\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_a64a793d5f7f6f3a156c68812cb92029f5c0_16f88a17\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_bb59bc5c5442ecdef6abef3932331c8e0474d4_15be0198\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_iexplore.exe_d1e8fe8b3c7a47d6b5314a95387846dc54867_0f9abb52\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_156541b14b98a434709f5ad1ec24b7cbcccbc7a_14f6b808\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_1718974997a4c561db7fe8d03c355052e97aec58_0837d1a0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_6c7f5939675cd3dce26f9e5782edd5fbed2a7fa6_120b01e3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_92f06a832b8677a04c555e3c1df3bb2a47397b3_0ea3f900\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_bb3fd3628871eba9cd6148baf46e4d8910199349_124c4e1f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_d4ce245a19e632075a5e4bf6c65a4f6e1ebb_11ff1c38\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\Critical_iexplore.exe_ff2c4cff6bb5de95635ef28eca219d30d6d513fd_15653448\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0b0a34a8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_0dace206\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_148f6c2a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_49ec16c58917e02153361e9e198d2931c2537b1_174b1d11\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_068a99ce\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_11c893e5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_524189df56158e46577b9aa57268b627099f73_176984e7\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_01481a92\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_02d22952\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0349a037\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_058e13ef\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_05ec9c8c\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_06258e5c\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_081f06c5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08383294\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08397f01\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_085b9c10\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08a7df08\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_08e24f97\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09a1cfeb\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09e9d308\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_09fd0a8b\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0d84787a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0db75d3c\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0e9d9c9d\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_0ed4fdaf\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1006980d\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_103460f5\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_10408545\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1054f40e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+dcllf+.txt"
         

Alt 07.04.2016, 17:21   #9
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:
Code:
ATTFilter
tArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1209e55f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1228ad3f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12716a67\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_128b3562\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_12cb6569\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_131960a6\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_13f39898\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14079c7f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14122829\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_145b282a\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_146ee985\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14b466ce\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c3782d\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14c59c6e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_14f065b7\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_151491d3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_15521812\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1578051f\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1579ac65\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_160c3bc8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_163efd13\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d2d39\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_164d7771\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1675b202\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_1679b0aa\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16a822fc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b24de3\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16b6ff09\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_16fe6895\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_171943b4\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_783f9c0164c5583a7eab42cee843e945e26dc_17d881ed\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_iexplore.exe_daae730aab8bd5181ec4ad3a81c30261db36f8_0a8bef4e\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_1669c080\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_Microsoft Window_e5e7904e859d4ad0218a2cf3a5242792e19523e2_17cc5495\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0b7341d0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_x64_72d71fff041c28093aeb43c42aa8a1bd1bb7f98_0cfc7148\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows\WER\ReportQueue\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\15.4\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Contacts\Default\W4CR1\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+dcllf+.txt"
         
esetlog:
Code:
ATTFilter
nt Album Viewer\SqmApi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Client Album Viewer\SqmApi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Backup\new\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Calendars\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Outbox\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Proof\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Sentinel\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Deleted Items\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Drafts\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+fnnjm+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Storage Folders\Sent Items\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Deleted Items\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Drafts\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Inbox\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Junk E-mail\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+fnnjm+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\T-online (k 7bf\Sent Items\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\WLMDSS.tmp\WLMD686.tmp\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Deleted Items\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+fnnjm+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Mail\Your Feeds\Microsoft-Feeds\MSN Nachrichten\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Mail\Backup\old\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Media\12.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\Windows Sidebar\Gadgets\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Minesweeper\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Microsoft Games\Purble Place\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Power2Go\CLML\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-errraelet5\Files\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\01161541-00000bf8-vplps9yna9\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08081547-000006f0-ajo5kznivl\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121529-000014fc-qoixfp4vqh\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-wk1857fcq9\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\08121534-000014fc-z55nrlwtv1\Files\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201841-00001474-i0ci0ss53p\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201845-00000784-u1lqhamck9\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\09201951-0000145c-o8mnvnkoj3\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+fnnjm+.txt"
         

Alt 07.04.2016, 17:22   #10
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
ers\Lore\AppData\Local\Microsoft\Windows Live Clie
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\acrord32_sbx\Temporary Internet Files\Content.IE5\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Adobe\Acrobat\10.0\+REcovER+lxnyl+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\BingBarInstallerLogs\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\EDC16DB.tmp.pre\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Google Toolbar\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Log\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\+REcovER+lxnyl+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cab9BE4\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Cookies\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\History\History.IE5\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Messenger Companion\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\8KSB3B16\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\EPVBRGZ1\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OV0DXJ6L\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Low\Temporary Internet Files\Content.IE5\OW8MFKLC\+REcovER+lxnyl+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\mozilla-temp-files\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\msdt\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\MUI\CyberLink Blu-ray Disc Suite\Power2Go\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\Samsung CLX-3300 Series\SCNSearch\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp13888.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp20627.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp25494.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp30892.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp41335.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp54392.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp60043.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp63106.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp71405.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\tmp76257.WMC\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\WLMDSS.tmp\WLME1D4.tmp\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{08065FA4-AFE4-4DA9-AA32-EF113F8E2249}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{17EB761D-1566-44D0-A464-69B6A2B4B5FB}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{29141238-157E-44A5-A4D8-523BDEA17BF7}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2C82341E-EA83-4B4C-B636-A7224A45DF79}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{2CE6132D-D571-4277-8F16-846FCE3FECB5}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{310A8DB4-E8B2-4C48-B45C-CDBF0F97E7C7}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{351D3441-00D6-49E0-85BD-982B8055365E}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{41A4D667-74DB-42DE-A44E-2299153FDF6B}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{617541D4-9A3D-4FE4-9298-44754470A04A}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8498466F-9AE7-4451-AEFA-08800E575843}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{87A8C1C8-C187-4FE7-A310-EDEF391C56ED}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{8BD8735C-C262-4AE7-893D-83A0B8E81154}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{BF5F50EA-F201-45A3-BB28-BC2C3641785D}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{C7AD0968-8D2B-44D9-A93C-E30E81E41362}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{CBF0D0E3-BFE0-4046-A424-51BD0736A278}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{E62D3B50-C761-42E6-A6E9-11BE292065CE}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EC2D60C4-3BC4-46B1-9FD2-A5C8896D88AC}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{ED67F32D-2CEF-41A6-85AC-6567EB0FCF74}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{EEB319B1-7E1F-44E7-A29C-10A5DF17F25E}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Temp\{FCE4D426-E67C-4E19-879A-8C3EDFE2D106}\+REcovER+lxnyl+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\+REcovER+rrboi+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Shatter\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\DVD Maker\zh-TW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Elantech\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\host\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Fresco Logic Inc\Fresco Logic USB3.0 Host Controller\hub\+REcovER+rrboi+.txt"
         

Alt 07.04.2016, 17:23   #11
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
ers\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\da\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\en\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\es\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ja\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\ko\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\nl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\no\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\pt-PT\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\sv\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hans\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\TurboBoost\Licenses\zh-Hant\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\AutoImport\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\Config\Skins\Intel\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\EvTrace\DB\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\KmmdlPlugins\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ara\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\chs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\cht\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\csy\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\dan\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\deu\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ell\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\enu\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\esn\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fin\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\fra\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\heb\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\hun\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ita\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\jpn\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\kor\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nld\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\nor\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\plk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptb\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\ptg\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\rus\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\sve\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\tha\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\bin\LangResources\trk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Drivers\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\Help\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\ProfileImporters\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Intel\WiFi\UnifiedLogging\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\More Games\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+lxnyl+.txt"
         

Alt 07.04.2016, 17:23   #12
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
ers\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ar\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\bg\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ca\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\cs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\da\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\el\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\es\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\et\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\eu\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\he\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\hu\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\id\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ja\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ko\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lt\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\lv\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ms\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\nl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\no\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\pt-BR\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ro\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\ru\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Cyrl-CS\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sr-Latn-CS\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\sv\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\th\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\tr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\uk\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\vi\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hans\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.30514.0\zh-Hant\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Control Panel Client\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\coprocmanager\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Display\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Drs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\+REcovER+rrboi+.txt"
         

Alt 07.04.2016, 17:24   #13
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:
Code:
ATTFilter
ers\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.ControlPanel.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Driver.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\Display.Optimus.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\installer.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\Installer2\NVIDIA.Update.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\NVIDIA Corporation\NVSMI\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Lang\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\Mode\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\COM\x64\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\P4GUpdate.Gadget\P4GUpdate.Gadget\images\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\P4G\wallpaper\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Family Safety\WFP\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\zh-tw\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\Program Files (x86)\SamsungPrinterLiveUpdate\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\BBSvc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaNote\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\7.1.361.0\SeaPort\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\de-DE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+alttb+.txt"
         

Alt 07.04.2016, 17:25   #14
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
rs\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\IlsCache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Excel.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.de-de\1031\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.fr-fr\1036\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.it-it\1040\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.en\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.de-de\Proof.it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.ar\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.en\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.es\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.fr-fr\Proof.nl\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.en\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.it-it\Proof.it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Rosebud.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Updates\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OOBE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\de-de\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\fr-fr\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\OStarter\it-it\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\SeaPort\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Search Enhancement Pack\Search Box Extension\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+alttb+.txt"
         

Alt 07.04.2016, 17:26   #15
schorschle
 
Fenster gehen auf - Standard

Fenster gehen auf



esetlog:

Code:
ATTFilter
e
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Vault\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{0300FFEF-24D5-4E4F-99D8-C233B1279305}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{3B41AE45-0FEE-4BA8-A61F-2069AE101986}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{FC7146D4-7FAC-41BF-9C53-175FFE563374}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\2F482164\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\5425BC00\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\763EE170\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\774ABED8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\832814B6\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\A6B33DD8\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\BEC02B6E\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\C41EB80A\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\D9D779A0\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\EE896452\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\F04A7D2F\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5E\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF5F\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF7C\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\Download\FFFFFFFFFFFFFF82\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+alttb+.txt"
sh=C4B6D40EA46675265428E43415B6442BDBEB5090 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+dcllf+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\NVIDIA\Updatus\UMDShim\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\VirtualStore\ProgramData\Samsung\EPM\Strings\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live\.cache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\Inst\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\Windows Live Writer\ResourceCache\live\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{03BBD129-8522-415E-9C43-8F95D28343A0}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04A147F2-A71B-4B31-8806-EFF07CBC1932}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04EB276F-45D0-4A38-B1E7-868995E6985F}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{04FE2E33-F3AD-4FFC-8742-184BDFA5ED59}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0940505C-2110-49FC-B866-E87C35810A37}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0B3F0A50-4A42-4957-A27D-442C2709EC9B}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{0DAFA430-C5BD-4069-9A8B-FF7AFB009FB6}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1441EBC4-4C42-4233-B4A6-46B010558748}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1927A89D-33D0-48C2-A514-9ED109A8387F}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1AE6AB21-EC37-4633-B986-064D0B2A1C03}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1C0BAFB3-2CAA-429E-A9E7-6CD9EE274E38}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1CAD4D48-6700-48D4-AA88-A51FF10F63BC}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{1E793F2C-1274-47BB-A96C-36E6806CE69B}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{20577B9A-8DB7-4325-9466-6A661AAF8A03}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{242BAC27-7DC6-417C-AF6E-BF73D974DA68}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{28389792-D05C-4E74-AD6F-4F5D729DBC5C}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2851E8A5-393B-44D4-986E-580BAB281E1A}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{288A19E2-D09A-47A2-AD67-213C4CBA97BA}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2B989C8E-781F-4358-A6E6-5165085FA386}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2D9D4B93-8399-440C-BB80-BDA99510494E}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{2ECAEE19-2E05-40E8-99CE-0AB738A11F3F}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{332EF4E5-208A-49E5-AF5A-57522B4C756F}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3BC43BF8-E9FB-4DB4-8776-0CAC62D00394}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3CAA06CA-6085-41A5-8229-500E869C2DAD}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3E7DF4A8-53F0-4429-8D31-15BBB80D2B74}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3EBFFF44-AA03-41BB-8AE8-795D6C2A3056}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F58187A-8A16-48BA-B9D8-029AEA1970D1}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{3F836472-3A2D-4444-B4C1-BB9FC150D24A}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{401100A5-7CED-4253-85E1-427D06CD7157}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+fnnjm+.txt"
sh=7D85506A4C9C8A67BB1B57AA951C81B794D2639C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+lxnyl+.txt"
sh=642EE24A538755257A9DF2827B6C2E6E05A7BA78 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42AB7CE0-7456-4643-B16C-51B1FDBE9D05}\+REcovER+rrboi+.txt"
sh=B48605138DC00490FF8A92F8E4B20CFFEC791A2F ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42EC1DBC-847D-4925-895F-75583423C66D}\+REcovER+alttb+.txt"
sh=C0056E3BA20C6CE58FA48CE9048887312B9127B2 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt Trojaner" ac=I fn="C:\Users\Lore\AppData\Local\{42EC1DBC-847D-4925-895F-75583423C66D}\+REcovER+fnnjm+.txt"
         

Antwort

Themen zu Fenster gehen auf
asus, ccsetup, computer, defender, dnsapi.dll, explorer, firewall, flash player, google, helper, home, internet, kaspersky, monitor, neustart, nvidia, programme, realtek, rundll, services.exe, software, svchost.exe, system, total commander, udp, usb, windows, winlogon.exe




Ähnliche Themen: Fenster gehen auf


  1. W7, Fenster verschwinden in Hintergrund, Bilder etc gehen "weiter"
    Log-Analyse und Auswertung - 05.04.2016 (14)
  2. POPUP Fenster gehen auf!
    Log-Analyse und Auswertung - 12.02.2015 (17)
  3. Win8, Laptop hängt sich auf,Touchpad reagiert nicht, unaneforderte Fenster gehen auf...
    Log-Analyse und Auswertung - 05.12.2014 (7)
  4. Nicht aufgerufene webseiten öffnen sich, Fenster gehen nach Einfach-Klick mehrfach auf
    Plagegeister aller Art und deren Bekämpfung - 29.10.2014 (7)
  5. internet extrem langsam und es gehen immer fenster von alleine auf
    Log-Analyse und Auswertung - 31.07.2014 (3)
  6. Windows 7: ungewollte pop ups fenster und "mouseover" fenster
    Log-Analyse und Auswertung - 05.10.2013 (11)
  7. Medion P7818 Win8, Extrem langsam beim Starten, dauernd gehen Fenster mit online Spielen auf
    Plagegeister aller Art und deren Bekämpfung - 24.06.2013 (65)
  8. popup fenster gehen alle paar minuten auf
    Log-Analyse und Auswertung - 27.10.2010 (4)
  9. Windows update geht nicht, Iexploprer Fenster gehen auf usw.
    Plagegeister aller Art und deren Bekämpfung - 09.08.2010 (22)
  10. Updates gehen nicht mehr, Hijackthis, Spybot etc gehen nicht
    Log-Analyse und Auswertung - 16.09.2009 (16)
  11. Internetseiten gehen nicht
    Netzwerk und Hardware - 22.01.2009 (12)
  12. Fenster mit Spywareprogramme und Werbung gehen von alleine auf im IE
    Log-Analyse und Auswertung - 21.11.2008 (4)
  13. werbe fenster gehen alle zwei bis drei minuten auf
    Plagegeister aller Art und deren Bekämpfung - 21.08.2008 (25)
  14. Win2000: aktives Fenster wird inaktiv; DFÜ-Fenster erscheint von selbst
    Log-Analyse und Auswertung - 21.01.2007 (2)
  15. Bei mir gehen seit Gestern immer neue Fenster im IE auf
    Plagegeister aller Art und deren Bekämpfung - 25.10.2005 (2)

Zum Thema Fenster gehen auf - Hallo, Leider habe ich mir was eingefangen... Würde mich sehr über eure Hilfe freuen.Danke Problem: Win7 startet dann werden 6-7 Fenster aufgeklappt c:\windows\system32\cmd.exe C:\user\lore\Documents\edbmmp.exe konnte nicht gefunden werden habe den - Fenster gehen auf...
Archiv
Du betrachtest: Fenster gehen auf auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.