ESETSmartInstaller@High as CAB hook log: OnlineScanner64.ocx - registred OK OnlineScanner.ocx - registred OK Update Init Update Download Update Finalize Updated modules version: 28896 # product=EOS # version=8 # IEXPLORE.EXE=11.00.9600.16428 (winblue_gdr.131013-1700) # EOSSerial=780ed7b901bffa4aa979af4187a01682 # end=init # utc_time=2016-04-08 07:06:02 # local_time=2016-04-08 09:06:02 (+0100, West-Europa (zomertijd)) # country="Belgium" # osver=6.1.7601 NT Service Pack 1 Update Init Update Download Update Finalize Updated modules version: 28965 # product=EOS # version=8 # IEXPLORE.EXE=11.00.9600.16428 (winblue_gdr.131013-1700) # EOSSerial=780ed7b901bffa4aa979af4187a01682 # end=updated # utc_time=2016-04-08 07:07:33 # local_time=2016-04-08 09:07:33 (+0100, West-Europa (zomertijd)) # country="Belgium" # osver=6.1.7601 NT Service Pack 1 # product=EOS # version=8 # IEXPLORE.EXE=11.00.9600.16428 (winblue_gdr.131013-1700) # OnlineScanner.ocx=1.0.0.7777 # api_version=3.1.1 # EOSSerial=780ed7b901bffa4aa979af4187a01682 # engine=28965 # end=stopped # remove_checked=false # archives_checked=false # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2016-04-08 08:11:18 # local_time=2016-04-08 10:11:18 (+0100, West-Europa (zomertijd)) # country="Belgium" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode_1='' # compatibility_mode=5893 16776573 100 94 338738 211732928 0 0 # scanned=141099 # found=2581 # cleaned=0 # scan_time=3823 sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\book\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Config.Msi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\drivers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\CUI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\CUI\Resource\+REcovER+qmsnc+.txt" sh=D4E393BC7B12A07A70A7905EF90820BBA055A324 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000041\f[4].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\10.0\+REcovER+pbble+.txt" sh=C8B62EC2D8E285EC687B0525D0A1BC2AAE8A30D3 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000106\f[8].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\ABB\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\ABB\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\AHCISETTINGS\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\AHCISETTINGS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\DeviceInformation\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\WindowsInformation\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\IE9\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\IE9\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\MUI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\MUI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAAR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAAR\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAEM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAEM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAGW\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAGW\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAPB\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAPB\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Evernote\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Evernote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Fooz Kids\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Kobo\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\VC2005 SP1\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\Share\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\Share\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\express\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\expresshelpchm\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\startsmarthelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\update\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\NDP30SP2-KB981107-x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{046FDEE1-7615-4CE7-990D-19D4CC134D5F}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{074EE22F-2485-4FED-83D1-AAC36C3D9ED0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{22AA129A-8E5D-45AE-A3E4-D110703EF141}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{3D0986A7-2F13-4AD4-A35F-D167603DB43F}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{3D0986A7-2F13-4AD4-A35F-D167603DB43F}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{4C6E12E5-5905-4aa5-B462-E7DFC4BD75E5}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A5D3B160-0EA1-4A57-8D82-C53A853AEB07}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A5D3B160-0EA1-4A57-8D82-C53A853AEB07}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{B56633A3-7ADC-4CE5-A320-ACA0B65DA04B}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{B56633A3-7ADC-4CE5-A320-ACA0B65DA04B}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{BF80A1C0-C3FF-4B1C-ABEF-22CD4F97A0AB}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C00D1E35-750C-4021-86E0-A088C6678DD9}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C597C3FC-2110-451E-832E-9352964E56F9}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C597C3FC-2110-451E-832E-9352964E56F9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{E1EFF81F-E42D-4D52-8C56-3493C52D5641}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\backitup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\backituphelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenter\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\corecomponents\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\express\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\expresshelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\rescueagent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\rescueagenthelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\update\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\Delay_NeroBackItUp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{22AA129A-8E5D-45AE-A3E4-D110703EF141}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{4542C6AD-D1CE-43AD-A181-C32A06A99547}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{8D7309F4-C4B6-4408-8DA9-D3B0E7987822}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Norton Online Backup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Identity Card\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Power Management v6.00\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Recovery Management\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Registration\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Skype\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\Setup\RunTime\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\Setup\RunTime\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Welcome Center\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\HowToUse\Images\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\HowToUse\_notes\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\PB Logo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Atheros WLAN SDK Atheros SDK\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Atheros WLAN SDK Atheros SDK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Card Reader Chip BCM57785X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Card Reader Chip BCM57785X\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\amd64\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\amd64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\x86\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Elantech Touchpad\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Elantech Touchpad\X86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\f6flpy-x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\f6flpy-x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ar-SA\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ar-SA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\cs-CZ\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\en-US\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\es-ES\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fr-FR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fr-FR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\he-IL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hr-HR\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hr-HR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hu-HU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ja-JP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ko-KR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ko-KR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\nb-NO\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pl-PL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pl-PL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pt-BR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pt-BR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ru-RU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sk-SK\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sk-SK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sl-SI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sl-SI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sv-SE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sv-SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\th-TH\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\th-TH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\tr-TR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\zh-CN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\zh-TW\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\IVB\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\IVB\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\SNB\win32\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\SNB\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\ibxHDMI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\ar-SA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\hr-HR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\it-IT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\zh-TW\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\MediaSDK\SNB\win32\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\x64\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\All\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\ia64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\ELL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\ESP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FIN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FRA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FRC\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\HUN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\TRK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\TRK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\WIN7\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Drivers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Drivers\MEI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Firmware Recovery Agent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IFR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Intel Control Center\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IntelMEFWVER\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IUS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ar-SA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\en-US\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\es-ES\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\fr-FR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\hu-HU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ja-JP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\nb-NO\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\pl-PL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\pt-PT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ru-RU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sk-SK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sl-SI\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sv-SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\th-TH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\tr-TR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\zh-CN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\LMS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\UNS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\Config\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K3\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K3\us\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K_XP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\WDM\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\PackardBell User Guide\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\PackardBell User Guide\00\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\CodeTracer\setEventLog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\CodeTracer\setEventLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\acer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\acer\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Founder\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Founder\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\Backgrounds\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Packardbell\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\mui\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\WinSAT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\WinSAT\DataStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\DeployWinRE_log\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\DeployWinRE_log\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\MSDRV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PatchLog\CodeTracer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PreloadX_SP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PreloadX_SP\A00DD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\RunCmdLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetLocalizedName_log\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetPhotoGallery\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetScreenSaverLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SpConfig\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\OOBEOffer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\setEventLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Registration\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\PerfLogs\System\Diagnostics\BJARKE_20151202-000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Accessory Store\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Broadcom\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Intel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Intel\Media SDK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus Updater\11.10.767.8917\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ln\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ml\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sr@latin\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\st\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\su\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sw\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\DW\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\it-IT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\nb-NO\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pl-PL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pt-BR\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pt-PT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\OFFICE14\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\msadc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\Ole DB\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\Ole DB\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DIFX\4CBAA680AB78144E\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Google\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\Bin\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Intel\iCLS Client\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc1\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\extern\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\Mahjong\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\SpiderSolitaire\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Office\Office14\1033\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\et\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\he\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\ru\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\sl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\MSBuild\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\et\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\HelpFile_F\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\tr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_F\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_G\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\fi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\fr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\kr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\pl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\remote\icon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Defender\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\fi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\fr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\he\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\th\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\zh-tw\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Mail\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Mail\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Media Renderer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Network Sharing\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Skins\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Visualizations\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows NT\Accessories\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\nl-NL\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\nl-NL\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\nl-NL\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\Acer Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\Acer Updater\Download\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\Security\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\Security\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\UserData\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\UserData\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\SocialNetworkService\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\Video Webcamera\1.5\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\SocialNetworkService\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\SocialNetworkService\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\Video Webcamera\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Fooz Kids\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\CN1CQ3204P05V3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\CN1CQ3204P05V3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\CN1CQ3204P05V3\DevMgmt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HPUDC\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1025\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1029\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1030\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1031\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1032\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1037\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1041\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1042\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1042\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1043\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1044\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1044\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1045\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1045\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1046\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1049\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1053\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1055\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1055\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\2052\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\IoMgmt\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\IoMgmt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\Scan\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\Scan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\WebFirmwareUpdate\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\WebFirmwareUpdate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\Applets\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\Applets\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\ExtremeGraphics\CUI\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\ExtremeGraphics\CUI\Resource\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\iCLS Client\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Activation\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Cache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\CrashDumps\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\History\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Options\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Options\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Statistics\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Statistics\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\MachineKeys\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\MachineKeys\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Device Stage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\DeviceSync\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\lineup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\recordings\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\subscriptions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\ClientUpdate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup-2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight-2\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\RecoveryTasks\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\HTML Help\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\IdentityCRL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\IdentityCRL\production\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Network\Connections\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\1043\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office64.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.en\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\RAC\Temp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\RAC\Temp\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\User Account Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\ar\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\en-US\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\hu\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\ru\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\Cache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{0f8ade68-df58-4eae-a24a-e238d634bf55}\PlayTasks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{0f8ade68-df58-4eae-a24a-e238d634bf55}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{6E7DD52D-205E-4D6D-AF6A-0C34703DFA61}\PlayTasks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{6E7DD52D-205E-4D6D-AF6A-0C34703DFA61}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{A4B598D2-9BFF-456F-A667-D3B8A0849286}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Manifest\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Sessions\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Upload\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\Resources\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\Resources\F7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\CacheManager\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Quick\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\System\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Store\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows NT\MSFax\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows NT\MSFax\SentItems\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\MetaData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\PushMarketingFeeds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\00000582\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\00000582\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\NortonInstaller\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\NortonInstaller\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\onlybackground\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\OOBEOffer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\Power Management\Log\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\ScreenSaver\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Oracle\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Oracle\Java\installcache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\634739380139197661\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\634739380139197661\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Info\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Info\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\ParetoLogic\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\ParetoLogic\UUS3\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\Qualcomm Atheros Direct Connect\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\Qualcomm Atheros Direct Connect\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\platform\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\black-on-white\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\black-on-white\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\normal\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\languages\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{AA59DDE4-B672-4621-A016-4C248204957A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{AA59DDE4-B672-4621-A016-4C248204957A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Sun\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{A0382E3C-7384-429A-9BFA-AF5888E5A193}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{E3739848-5329-48E3-8D28-5BBD6E8BE384}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{E3739848-5329-48E3-8D28-5BBD6E8BE384}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\AppIcons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\AppIcons\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameData\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameDiscovery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameInstalls\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameInstalls\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Updater\GameConsole\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Updater\GameConsole\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Users\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\Downloads\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\settings\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\settings\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recovery\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$R0HHWWJ.txt" sh=FBC2F388E12E8EDEF676CE8B90F5CE7BA549F218 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSS1Y92.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$R3T41C3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RJ7IKOM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RKC5W46.template\Contents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\Contents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\thumbs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\Contents\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\thumbs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\thumbs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\1R4QXALK\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\37K2BJO3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\63R6CY63\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\VJ94CHDA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\VJ94CHDA\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSNLNHW.template\thumbs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\History.IE5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RZBX108.template\thumbs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\sh4ldr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Color\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Color\Profiles\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\Youcam\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\460911090\2016032619.000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\EmieUserList\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\EmieUserList\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Google\CrashReports\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Hewlett-Packard\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Hewlett-Packard\HPDIA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\003\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\005\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\005\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\006\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\006\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\007\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\007\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\008\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\011\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\011\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\015\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\018\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\021\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\028\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\029\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\030\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\032\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\032\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\HP Photosmart 5510 series\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\nl-NL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\jscrollpane\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\footer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\js\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\loc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.0.765\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\notifications\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\notifications\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\providers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\jscrollpane\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\jscrollpane\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\mocks\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\mocks\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\loc\nl-be\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\VersionIndependent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\footer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\System\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\System\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\34e548a8-3268-4dde-bedf-c40f9b6c814a\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\aa874297-adea-49b9-a0f9-d2ac67191254\DeviceInformation\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Device\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Device\nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Task\{62275ce5-ec7d-4b53-9b11-355271e6e178}\nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\SoftwareInfo\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\SoftwareInfo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Event Viewer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\4AB3DEOP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\7PK314DN\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\7PK314DN\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\CV5X3GVA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\KBT9G2G3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\FORMS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IME12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IME12\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP12\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP8_1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP9_0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\9ZC8BSG7\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\9ZC8BSG7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\TS4R3R6S\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\TS4R3R6S\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\High\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10224758000\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10323245420\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10689114170\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-11892234470\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-15705535740\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18187976470\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2375398810\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2813849570\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6397009680\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8255704550\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin10059975020\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin10059975020\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14080290840\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14690366770\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14802782150\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14912218160\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin15711633250\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin15711633250\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin1682904900\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin19636395310\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20867721010\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20867721010\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin4529079810\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin4529079810\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin557149200\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin557149200\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5697298620\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5697298620\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin6797759040\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\UrlBlockManager\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\UrlBlockManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\Groove\System\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\Groove\User\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\UnsavedFiles\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Outlook\RoamCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\PlayReady\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Portable Devices\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1033\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\AppCache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Burn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\GameExplorer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016030720160314\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016031420160321\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016032120160328\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016032820160329\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016033020160331\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\History.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\History.IE5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Ringtones\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Ringtones\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+voevt+.txt" sh=AD85904036D108541D85174005AF08A9C05073B0 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\f[8].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6JX8XB2P\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F3H5WVXM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F3H5WVXM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPDEUBUS\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LZ0HNIDB\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LZ0HNIDB\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OJEZ0M71\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OJEZ0M71\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TPO80MJ6\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TPO80MJ6\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WC10QHYV\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTDAPJM6\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\+REcovER+xjqwm+.txt" sh=2D724C0D2C02547F1FEF262411D016680D21C050 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\f[2].txt" sh=45B6AF556DBFCD9A814CD13E00897BEA74158D55 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\f[6]_9.txt" sh=2EC524B5D5D4D5305F1A07EC6DCF60B4026AA3AD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\get[1].txt" sh=BBC8FEB26050B595339119753350979B09343C2D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\fLRAC5QT8.txt" sh=5F4955E6768C7872A0270EEC72E2A236553C34E3 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\f[6]_7.txt" sh=B78A488727E573A6371000CA47FCD6813D5A3F45 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\f[7]_4.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+xjqwm+.txt" sh=9DC87029EFC360C9C4382BD11261B27850F45F43 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\f[2]_4.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+voevt+.txt" sh=ECF73DF3CC09CF12852D0072AE7D4A84C19473AD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\f72QVSIBD.txt" sh=98ADB2B0CC6F6F9B5E07281ECB552E20D648D6D5 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\fIZOOWIX8.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\+REcovER+qmsnc+.txt" sh=579EB4FACF5F3648BDA7958DE0A932BF72ED8E0B ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\fIHLIJVL0.txt" sh=B3ED274658B0973FADAD31639CA07E8535CE3D4D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\f[9].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\+REcovER+pbble+.txt" sh=75371C2E2CADEDE76969E622C697A14A1AFCE2FF ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\f[6]_3.txt" sh=D38D0B2BB08A2E645051342D46197CB8B4C3373C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+xjqwm+.txt" sh=08AB3B47CD11627CCC7282F87E85562045089588 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\fTA7RBILD.txt" sh=24402F514E07E1AA0BD780D1B47437986CEA7CDA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\fU40JRS3C.txt" sh=90E7C29C1137A34614B8D7EB37C275C2B965B096 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\f[3]_7.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JSZRKHG8\+REcovER+xjqwm+.txt" sh=331F3C2B92A8AE3AFD2DDD7BCFF3BB9FB2BA9C92 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JSZRKHG8\f[5]_11.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\+REcovER+qmsnc+.txt" sh=BC189E142D6EFDB79DF4B624AE51C462CB41C25C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\f[8]_1.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\+REcovER+qmsnc+.txt" sh=135A545DF1FAECB9C7874BF1F5C33EBA40B90861 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\f1QN5BIDW.txt" sh=9894BEF770F2CF84BCC59B847A555C4B675B5F3B ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VILRM7L9\+REcovER+qmsnc+_1.txt" sh=2FDE0B346D7004A62A58C029B61A5C32EE041719 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\W0CDSEAZ\fCS1BWGJL.txt" sh=3AE23BA0A8769308796AE4B8F2EED9BD2BC3CA28 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\W0CDSEAZ\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\ProgramData\Visan\AppIcons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Caches\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Explorer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Libraries\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Desktop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet2\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061111_Fantasia\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061221_5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061906_Barbara18\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061906_Barbara18\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070417_FortisLadies&Loena\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070417_FortisLadies&Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070816_Walibi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070816_Walibi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071117_Fantasia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071225_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071225_Kerst\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080117_GBritain\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080307_Carnaval_Bab\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080316_Galabal-EHSAL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080327_Ardennen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20090328_DoopVince\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100811_TuinhotelLommel\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100822_Thierry50\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100822_Thierry50\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20101231_Kerst\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130104_NieuwJaar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130203_Toby\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130316_Dirk40\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130316_Dirk40\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130513_VerjaardagSofieBern\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130620_BBQ_Hippelenberg\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130720_Els40\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130803_Hip\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130803_Hip\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130807_Patje54\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130816_ZomerVakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130824_ElsDirkFeest\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20140801_Vakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20140802_Plopsaland\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\AP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Barbara\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Patrick\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Soeshi\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Soeshi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sofie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sofie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{117E056F-22CE-42AD-B55E-6FB5E9214531}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{117E056F-22CE-42AD-B55E-6FB5E9214531}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{164DE11A-4804-4D90-B029-A47DC4FEB159}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{2B76C140-6EA6-4B2D-9554-5DEC717F09D2}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5A807C32-DAC7-4088-B82F-0DA90C1DA34D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{9F45E1DE-8761-4238-81B3-099A28940D94}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{9F45E1DE-8761-4238-81B3-099A28940D94}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B0E0F08F-DAD7-4BDF-A377-B5AA98C76B56}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B0E0F08F-DAD7-4BDF-A377-B5AA98C76B56}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B196D788-134E-45CA-BE84-393E25CB1D2F}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Mail\Stationery\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\24e3bb24-6f8a-4e06-a923-a920255afccb\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\77b7433c-cef2-402d-90df-e564967f303b\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\7c2aa315-69d5-4d13-89cd-3edb68028629\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Adobe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\BSvcUpdateConfig\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\BSvcUpdateConfig\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\cda4ef09-0da2-4fdf-b7be-f47ce3329c85\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\cda4ef09-0da2-4fdf-b7be-f47ce3329c85\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\AtStatus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\AtStatus\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Low\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Low\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\snsCDBB.tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\snsCDBB.tmp\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Accessory Store\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Accessory Store\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\BDrvK57Inst\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\BDrvK57Inst\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\MS\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\SD\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\SD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\XD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\Media SDK\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\Media SDK\s1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Lavasoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\4CBAA680AB78144E\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Full\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\OldAge\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Performance\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Pets\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Push\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\Bin\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\Bin\utils\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IUS\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IUS\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus\11.10.767.8917\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc2\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\nl-NL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\nl-NL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\Office14\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\Office14\1033\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ar\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ar\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\da\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\de\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\el\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\es\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\es\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\et\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\eu\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fi\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\he\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hr\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\nl\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt-BR\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt-BR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ro\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ru\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Cyrl-CS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Latn-CS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Latn-CS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sv\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\th\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\tr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\uk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\uk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\vi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\vi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\zh-Hans\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\zh-Hant\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\cs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\sk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\sl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\tr\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\zh-CHT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\et\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\HelpFile_P\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\tr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\zh-chs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_E\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\da\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\no\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\ru\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\sk\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\zh-cht\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Registration\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\icon\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\7digital\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\7digital\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\Eurosport\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ar\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ar\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\bg\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ca\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\cs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\cs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\da\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\da\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hu\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hu\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-br\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ru\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\sl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\nl-NL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\SeaNote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\SeaPort\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\HTML Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\MSDN\8.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\NetFramework\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.nl-nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.de\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.en\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.fr\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.fr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.nl-nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.nl-nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OFFICE\UICaptions\3082\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OFFICE\UICaptions\3082\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{2CDA08B9-FC69-472A-85A7-C00B4D8B0F12}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{68CD74BA-3E32-41C6-B357-D48813421A1F}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{68CD74BA-3E32-41C6-B357-D48813421A1F}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Oracle\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Oracle\Java\javapath\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Windows Live\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{094D2A37-C34E-4D89-B221-C1966F2968EC}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{094D2A37-C34E-4D89-B221-C1966F2968EC}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{8E66D222-C922-425E-9E80-F00C51CE937D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{C9A16F2D-424D-426B-8694-3953EB34F77A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{C9A16F2D-424D-426B-8694-3953EB34F77A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{E853E5C1-FE1C-4540-A340-17E67135CF7B}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Search\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Search\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\inprogress\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\inprogress\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\metadata\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\resources\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\fin\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\frn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\heb\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\hrv\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\hun\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\itl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\lav\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\slo\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\spn\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\EmieUserList\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\SmartPrint\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\SmartPrint\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\emulation\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\header\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\perftools\memory\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP8_1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP9_0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\1EHG9FVK\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\667JPIZW\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\667JPIZW\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\99H7C3F4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\99H7C3F4\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\BW6TTPD7\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\w89352q\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\w89352q\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\InBrowser\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\InBrowser\Profiles\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\143mdabquekm1fd2m03eupc40kdkeelh03tzp13otg3gw2kf1uaaahaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\143mdabquekm1fd2m03eupc40kdkeelh03tzp13otg3gw2kf1uaaahaa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\2er4le0id2hz1odtqyz4o3kcuao4bx2jgsyevunqnlpqkkulmjaaadha\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ffu532zwpa43ne3jpietmvbxcfzerriqjjpzjposx43ixgn4e2aaaeaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ffu532zwpa43ne3jpietmvbxcfzerriqjjpzjposx43ixgn4e2aaaeaa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\p51orcq5nfjbjlxs01ft5uv0kid1mo2hyhukdj3lyzdbmkeumuaaabca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ujsacomylzhslwkoc1jhgdwhewmugwssfwui5aaqmorvata4ljaaahca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\l\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\l\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\5abztsgz4bkxiu30ciiroazkkoijfxeaaukznn50dh1ijngbeyaaabaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\5abztsgz4bkxiu30ciiroazkkoijfxeaaukznn50dh1ijngbeyaaabaa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\f1tstzndxbxu44tklf4alaxaztamgn45er5r3yiiweh12cidykaaahfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\f1tstzndxbxu44tklf4alaxaztamgn45er5r3yiiweh12cidykaaahfa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\f\AvatarCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\f\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\AvatarCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\AvatarCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\KD62R2A3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\KD62R2A3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\AU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\AU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\AU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\ext\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\log\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\tmp\si\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\jre1.8.0_51\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Collab\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Forms\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\NLD\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\CRLCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Stamps\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Stamps\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\D4N7QTVX\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\NativeCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Headlights\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Headlights\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Linguistics\Dictionaries\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\CyberLink\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\HpUpdate\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Identities\{3FEC8642-B218-4439-A590-38BAF85706EF}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Identities\{3FEC8642-B218-4439-A590-38BAF85706EF}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\+REcovER+voevt+.txt" sh=0000000000000000000000000000000000000000 ft=- fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\cdnapi.kaltura.com\html5\html5lib\v2.41\modules\EmbedPlayer\binPlayers\kaltura-player\plugins\akamaiHDPlugin.swf\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\opf.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\player.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\s.ytimg.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\services.vrt.be\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\static1.koken.vtm.be\sites\all\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\static1.koken.vtm.be\sites\all\modules\vmma\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\www.tripadvisor.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\www.wezooz.be\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#player.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static1.dmcdn.net\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static1.koken.vtm.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.e-lotto.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.wezooz.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Media Center Programs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Media Center Programs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Access\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\AddIns\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Clip Organizer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\CLView\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\CLView\1033\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Credentials\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\RSA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Excel\XLSTART\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Excel\XLSTART\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP10\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP12\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP8_1\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP9_0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\7e4dca80246863e3\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\7e4dca80246863e3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\9d91276b0be3e46b\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Office\Recent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\PowerPoint\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\PowerPoint\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Proof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Proof\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Queries\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Reply_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Reply_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Slot_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Slot_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\nl-BE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\nl-BE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Stationery\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Stationery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Sticky Notes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Sticky Notes\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Colors\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Colors\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Effects\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Effects\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Fonts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Fonts\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\1033\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\UProof\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Vault\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\+REcovER+pbble+.txt" sh=FB4AF46A47A014BFCF34113118F9D487F84C5491 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\1KJS3KR6.txt" sh=FCE8A09CA193EDD23CFC183EF329547AFF4F12B0 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\D845BPF9.txt" sh=45038BB64628D13C3BA3343FA2B8EFC5E3C5E6E8 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\DFC73P5Q.txt" sh=6EB872CFC49664E28DA3842BF539B35AD66F06AE ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\ISZDUNPV.txt" sh=E24BAD6B6E385D4672FE54151AF7EB54AD540DDD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\KFAB12OD.txt" sh=E1316D1524011D72F9054E1AE0F08A0CA595AB06 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\LP8TX8KW.txt" sh=C7942E209206E1EE354DD43ABE7F957767E3E71D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZXW9TS92.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DefaultPack\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DefaultPack\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatUACache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IETldCache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Network Shortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\SendTo\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Templates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows Live Photo Gallery\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Word\STARTUP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\ParetoLogic\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\ParetoLogic\PC Health Advisor\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\Analytics\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\bejeweled3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\chuzzledeluxe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\chuzzledeluxe\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\fate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\finaldrivenitro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelmatch3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelquestmysteries7thgate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelquestmysteries7thgate\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\johndeeredrivegreen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\johndeeredrivegreen\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\penguins\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\penguins\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\plantsvszombies\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\polarbowler\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\polarbowler\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\slingodeluxe\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\slingodeluxe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\torchlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\weddingdash\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\weddingdash\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\zuma\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\Settings\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\Settings\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Contacts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\browser\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\browser\searchplugins\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\fonts\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\firefox\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\cache2\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\safebrowsing\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\thumbnails\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\bookmarkbackups\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\content\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ach\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\am\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ast\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bal\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bg_BG\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\brx\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ca\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\co\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\csb\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\cs_CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\dz\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\es_AR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\et\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\eu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fil\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ga\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gd\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ha\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\he\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\hr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\km\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\kn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ku\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ku_IQ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ln\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ml\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\pt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ro\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ru\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ru@petr1708\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\scn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sco\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\so\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sr@latin\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\st\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\su\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sv_SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sw\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\szl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ta\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\te_IN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\tg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\th\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ti\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\tl_PH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ug@Arab\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\uk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ur\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ur_PK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\uz\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ve\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\vi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\wa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\zh_CN.GB2312\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\zh_HK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.meek-http-helper\extensions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\Debroyer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\Debroyer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\cache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\cache\downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\com.google.android.apps.magazines\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\com.google.android.apps.magazines\files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\files\cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\ACV\Vakbondspremie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Adres\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Budget\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\Borstonderzoek\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\CM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\New_PC\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Belgacom\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Belgacom\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Proximus\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Telenet\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\HealthCare_AG\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\HealthCare_AG\20150127_Bril_Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\Raam_Badkamer_Links\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2014\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2015\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2016\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Loon\JaarOverzicht\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Pensioen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Pensioen\2015\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\Neten\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\Neten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Functie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000002\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000004\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000005\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000005\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000006\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000006\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000007\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000007\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000008\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000008\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000004\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000004\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000005\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000006\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000001\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000002\00000005\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000001\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000003\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000008\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000004\00000001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000004\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\OsiriX Lite.app\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\OsiriX Lite.app\Contents\Resources\OsiriXDB_DataModel.momd\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000003\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Pensioen\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Barbara\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\AGInsurance\Familis\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\AGInsurance\MedischeBeroepen_66130613\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Alarm\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Bank\Rondo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Huisvuil\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\KI\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Persoon\AJ2015_Inkomsten2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\C1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\C3_Picasso\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Bril\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Bijdrage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\HomeTrainer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\HomeTrainer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Terugbetaling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Voorhuwelijkssparen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\ZorgVerzekering\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Dats\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Dats\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\DeLijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Electrabel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\LaRedoute\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Proximus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\SintMaria\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Verwarming\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Verwarming\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Drafts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Drafts\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Inbox\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Personal CoverPages\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\AutoRadioCD_C1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Bladzuiger\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Boormachine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Droogkast\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Keuken\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Keuken\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Kleine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Kleine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\GSM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\GSM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\PC\PackardBell_MediaMarkt_20121027\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Stofzuiger\Voordeelvanger\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Verwarming\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Verwarming\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\20150128_Miele\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\20150128_Miele\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Leger\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ma\BelastingPa\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ouders_Home\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ouders_SVHG\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Begrafenis_Coomans\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Muziek\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Pensioendienst_Overheidssector\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\ATAG\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\ATAG\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Links\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Online_Documents\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Music\Sample Music\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20061111_Fantasia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20061221_5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\Foto's\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\Foto's-berlijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071117_Fantasia\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080117_Engeland\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080117_GBritain\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080327_Ardennen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080329_Vince\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080329_Vince\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080515_Amsterdam\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080620_Ouders50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080727_Sylvie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080727_Sylvie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080808_Lissabon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080815_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081025_K3\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081115_Fantasia\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081129_Boone\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081129_Boone\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081225_Kerst2\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081227_JP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090131_Nestor\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090801_Bodrum2\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090814_Leuven\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090815_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090912_Faye5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091031_Appart_Sofie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091114_Move\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091114_Move\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100110_NewYear_ElsDirk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100401_Pasen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100401_Pasen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100524_Sofie25\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100619_Barbara22\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100701_Allerlei\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100701_Allerlei\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100726_FayeVince\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100726_FayeVince\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100801_Poes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100808_Patrick51\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100828_Anne50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101114_Nelly\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101225_Kerst\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101231_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110501_Pasen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110601_CLB\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110701_Buurt\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110701_Buurt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110807_Verlof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120401_CommunieFaye\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120531_RaamBadkamer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120801_Zomer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120831_Zomer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120922_Efteling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Dag1_Zondag\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Dag4_Woensdag\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Week1\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130620_BBQ_Hippelenberg\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130816_ZomerVakantie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130824_ElsDirkFeest\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130901_Faye9\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140626_AnnAlain\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140801_Vakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140802_Plopsaland\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140811_DeResidentie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140811_DeResidentie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140830_VerjaardagAnne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140830_VerjaardagAnne\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141207_KerstCollishop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141207_KerstCollishop\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141224_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141224_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141228_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141228_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141230_Zee\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141230_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150102_Leuven\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150131_Toby2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150207_DeKempeneer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150216_Bowling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150628_BBQLauraKarel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150628_BBQLauraKarel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150718_Zeeland\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150722_ZeeToby\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\Huis\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Halle\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\Borstonderzoek\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\CM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\Euromut\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\PreventieveGeneeskunde\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Belgacom\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Proximus\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Proximus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Telenet\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\Raam_Badkamer_Links\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Attesten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Loon\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Loon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Kolonie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Loon\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Scanned_Doc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Verlof\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Verlof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Colli\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\ACV\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Auto\C1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belastingen\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belastingen\Persoon\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\SamsungS4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\SamsungS4\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Bril\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Bijdrage\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Bijdrage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Terugbetaling\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Voorhuwelijkssparen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Voorhuwelijkssparen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\ZorgVerzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Dats\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Dats\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\DeLijn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\flickr downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\GSM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\NikonCoolpix_Macro_20080826\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\NikonCoolpix_Macro_20080826\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PackardBell_MediaMarkt_20121027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PackardBell_MediaMarkt_20121027\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PC\PackardBell_MediaMarkt_20121027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2007\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2007\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2008\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2008\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2009\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2009\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2010\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2010\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2015\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\Beertsestraat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Ouders_Home\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Ouders_SVHG\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Overlijden_Pa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Overlijden_Pa\Muziek\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Peers\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Tess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Start Menu\Programs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Start Menu\Programs\SpyHunter\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Videos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Local\Temp\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Roaming\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\Favorites\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\Music\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Desktop\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Documents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Downloads\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Saved Games\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Favorites\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Music\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Music\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\Sample Media\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\Sample Media\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\TempSBE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\ccLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Videos\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+xjqwm+.txt" sh=399AA69097C137CD73942E23B8A59993C3B3317D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\WindowsPowerShell\v1.0\nl-NL\about_requires.help.txt" sh=0000000000000000000000000000000000000000 ft=- fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan" ac=I fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\winsxs\amd64_cxfalpal_ibv64.inf_31bf3856ad364e35_6.1.7600.16385_none_db4796019d20adcb\wow64_microsoft-windows-p..ooler-networkclient_31bf3856ad364e35_6.1.7601.18142_none_a1cb5bc2bc049658\+REcovER+pbble+.txt" # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=780ed7b901bffa4aa979af4187a01682 # end=init # utc_time=2016-04-08 06:43:01 # local_time=2016-04-08 08:43:01 (+0100, West-Europa (zomertijd)) # country="Belgium" # osver=6.1.7601 NT Service Pack 1 Update Init Update Download Update Finalize Updated modules version: 28977 # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # EOSSerial=780ed7b901bffa4aa979af4187a01682 # end=updated # utc_time=2016-04-08 06:45:22 # local_time=2016-04-08 08:45:22 (+0100, West-Europa (zomertijd)) # country="Belgium" # osver=6.1.7601 NT Service Pack 1 # product=EOS # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.7777 # api_version=3.1.1 # EOSSerial=780ed7b901bffa4aa979af4187a01682 # engine=28977 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=true # antistealth_checked=true # utc_time=2016-04-08 08:10:33 # local_time=2016-04-08 10:10:33 (+0100, West-Europa (zomertijd)) # country="Belgium" # lang=2067 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode_1='' # compatibility_mode=5893 16776573 100 94 381893 211776083 0 0 # scanned=170742 # found=2581 # cleaned=2581 # scan_time=5107 sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\book\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Config.Msi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\drivers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\CUI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Intel\ExtremeGraphics\CUI\Resource\+REcovER+qmsnc+.txt" sh=D4E393BC7B12A07A70A7905EF90820BBA055A324 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000041\f[4].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000055\20130506T160818.677652PID3508\10.0\+REcovER+pbble+.txt" sh=C8B62EC2D8E285EC687B0525D0A1BC2AAE8A30D3 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Lost Location\DIR00000106\f[8].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\ABB\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\ABB\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\AHCISETTINGS\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\AHCISETTINGS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\DeviceInformation\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\CHANGECOMPUTERICON\Packages\WindowsInformation\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\HOTFIX\KB981287\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\IE9\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\IE9\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\MUI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\MUI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Flash Player\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Adobe Reader X\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAAR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAAR\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAEM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAEM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAGW\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAGW\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAPB\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Bing Bar\MAPB\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Evernote\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Evernote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Fooz Kids\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Kobo\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\RunTime\VC2005 SP1\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\Share\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\MediaEspresso\ShareFiles\Share\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\express\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\expresshelpchm\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\startsmarthelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\applications\update\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\NDP30SP2-KB981107-x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{046FDEE1-7615-4CE7-990D-19D4CC134D5F}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{074EE22F-2485-4FED-83D1-AAC36C3D9ED0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{22AA129A-8E5D-45AE-A3E4-D110703EF141}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{3D0986A7-2F13-4AD4-A35F-D167603DB43F}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{3D0986A7-2F13-4AD4-A35F-D167603DB43F}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{4C6E12E5-5905-4aa5-B462-E7DFC4BD75E5}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{700CE99A-BF60-457F-9AFB-3CAA65A73D29}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A4400125-0F4D-4B79-80B5-D85DADF61F7A}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A5D3B160-0EA1-4A57-8D82-C53A853AEB07}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{A5D3B160-0EA1-4A57-8D82-C53A853AEB07}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{B56633A3-7ADC-4CE5-A320-ACA0B65DA04B}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{B56633A3-7ADC-4CE5-A320-ACA0B65DA04B}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{BF80A1C0-C3FF-4B1C-ABEF-22CD4F97A0AB}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C00D1E35-750C-4021-86E0-A088C6678DD9}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C597C3FC-2110-451E-832E-9352964E56F9}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{C597C3FC-2110-451E-832E-9352964E56F9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{E1EFF81F-E42D-4D52-8C56-3493C52D5641}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\backitup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\backituphelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenter\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\controlcenterhelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\corecomponents\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\express\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\expresshelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\rescueagent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\rescueagenthelpchm\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\applications\update\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\Delay_NeroBackItUp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{22AA129A-8E5D-45AE-A3E4-D110703EF141}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{4542C6AD-D1CE-43AD-A181-C32A06A99547}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{5CCCB5E2-D83C-42AD-B8BA-6C073D804247}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{6BD3444F-03E6-4E21-BAD0-50E6A5820433}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{88CDD09D-1B57-4BB4-A192-33BA0CBCB566}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{8D7309F4-C4B6-4408-8DA9-D3B0E7987822}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Nero BackItUp 10 Essentials Packard Bell Edition\ISSetupPrerequisites\{D37C1D8F-C930-4005-BCD8-3715028461C0}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Norton Online Backup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Identity Card\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Power Management v6.00\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Recovery Management\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Registration\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Packard Bell Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Skype\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\Setup\RunTime\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Video Web Camera v1.5\Setup\RunTime\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\APP\Welcome Center\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\HowToUse\Images\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\HowToUse\_notes\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\PB Logo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\AutorunX\psd files\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Atheros WLAN SDK Atheros SDK\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Atheros WLAN SDK Atheros SDK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Card Reader Chip BCM57785X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Card Reader Chip BCM57785X\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\amd64\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\amd64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\x86\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Broadcom Lan BCM57785X\x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Elantech Touchpad\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Elantech Touchpad\X86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\f6flpy-x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel AHCI\f6flpy-x86\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ar-SA\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ar-SA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\cs-CZ\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\en-US\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\es-ES\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fr-FR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\fr-FR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\he-IL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hr-HR\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hr-HR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\hu-HU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ja-JP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ko-KR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ko-KR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\nb-NO\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pl-PL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pl-PL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pt-BR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\pt-BR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\ru-RU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sk-SK\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sk-SK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sl-SI\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sl-SI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sv-SE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\sv-SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\th-TH\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\th-TH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\tr-TR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\zh-CN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\lang\zh-TW\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\IVB\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\IVB\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\SNB\win32\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Graphics\MediaSDK\SNB\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\ibxHDMI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\ar-SA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\hr-HR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\it-IT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\Lang\zh-TW\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\MediaSDK\SNB\win32\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel Intel VGA UMA\x64\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\All\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\ia64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\ELL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\ESP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FIN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FRA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\FRC\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\HUN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\TRK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\Lang\CHIP\TRK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\WIN7\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel NB Chipset HM77\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Drivers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Drivers\MEI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Firmware Recovery Agent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IFR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Intel Control Center\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IntelMEFWVER\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\IUS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ar-SA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\cs-CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\da-DK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\de-DE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\el-GR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\en-US\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\es-ES\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\fi-FI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\fr-FR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\he-IL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\hu-HU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\it-IT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ja-JP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\nb-NO\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\pl-PL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\pt-PT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\ru-RU\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sk-SK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sl-SI\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\sv-SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\th-TH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\tr-TR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\Lang\zh-CN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\LMS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\UNS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Intel TurboBoost_Manageability Engine Code Manageability Engine Code\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\Config\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K3\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K3\us\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\MSHDQFE\Win2K_XP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\DRV\Realtek Audio Codec ALC271X_VB6\WDM\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\PackardBell User Guide\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Autorun\GUI\PackardBell User Guide\00\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\CodeTracer\setEventLog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\CodeTracer\setEventLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\acer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\acer\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\eMachines\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Founder\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Founder\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\Backgrounds\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Gateway\Backgrounds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\AlaunchX\Resource\Packardbell\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\mui\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\WinSAT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\Command\WinSAT\DataStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\DeployWinRE_log\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\DeployWinRE_log\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\MSDRV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PatchLog\CodeTracer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PreloadX_SP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\PreloadX_SP\A00DD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\RunCmdLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetLocalizedName_log\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetPhotoGallery\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SetScreenSaverLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\SpConfig\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\OOBEOffer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Preload\utility\setEventLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\OEM\Registration\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\PerfLogs\System\Diagnostics\BJARKE_20151202-000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Accessory Store\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Broadcom\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Intel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Intel\Media SDK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus Updater\11.10.767.8917\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ln\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ml\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\mn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\ps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sr@latin\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\st\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\su\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Lavasoft\Ad-Aware Antivirus\chrome\locale\sw\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\DW\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\it-IT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\nb-NO\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pl-PL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pt-BR\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\ink\pt-PT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\Microsoft Shared\OFFICE14\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\msadc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\Ole DB\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Common Files\System\Ole DB\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DIFX\4CBAA680AB78144E\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Google\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\Bin\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Intel\iCLS Client\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc1\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\extern\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\Mahjong\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Games\SpiderSolitaire\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Office\Office14\1033\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\et\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\he\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\ru\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Microsoft Silverlight\5.1.41212.0\sl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\MSBuild\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\et\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Power Management\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\HelpFile_F\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\tr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_F\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_G\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\fi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\fr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\kr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\no\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\Packard Bell Updater\Help\Image\pl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Packard Bell\remote\icon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Defender\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\fi\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\fr\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\he\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\sv\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\th\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Live\Mesh\zh-tw\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Mail\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Mail\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Media Renderer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Network Sharing\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Skins\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Media Player\Visualizations\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows NT\Accessories\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\nl-NL\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\nl-NL\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\nl-NL\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\nl-NL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\Acer Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Acer\Acer Updater\Download\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\Security\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\Acrobat\10.0\Replicate\Security\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Adobe\AIR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\UserData\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\BlueStacks\UserData\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CLSK\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\SocialNetworkService\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\CLUpdater\Video Webcamera\1.5\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\SocialNetworkService\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\SocialNetworkService\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\CyberLink\EvoParser\Video Webcamera\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Fooz Kids\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\CN1CQ3204P05V3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\CN1CQ3204P05V3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HP Photosmart 5510 series (USB)\XmlFileCache\CN1CQ3204P05V3\DevMgmt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\HPUDC\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1025\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1029\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1030\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1031\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1032\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1037\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1041\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1042\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1042\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1043\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1044\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1044\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1045\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1045\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1046\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1049\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1053\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1055\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\1055\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\Installer\Help\2052\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\IoMgmt\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\IoMgmt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\Scan\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\Scan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\WebFirmwareUpdate\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Photosmart 5510 series\XmlFileCache\CN1CQ3204P05V3\WebFirmwareUpdate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\HP\HP Support Solutions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\install_clap\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\Applets\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\DAL\Applets\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\ExtremeGraphics\CUI\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\ExtremeGraphics\CUI\Resource\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Intel\iCLS Client\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Activation\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Cache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\CrashDumps\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\History\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Options\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Options\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Quarantine\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Statistics\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Lavasoft\Ad-Aware 11\Statistics\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\MachineKeys\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Crypto\RSA\MachineKeys\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Device Stage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\DeviceSync\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\lineup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\recordings\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\mcepg2-0\backup\subscriptions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\ClientUpdate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup-2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight-2\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\eHome\RecoveryTasks\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\HTML Help\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\IdentityCRL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\IdentityCRL\production\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\NetFramework\BreadcrumbStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Network\Connections\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\1043\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Office64.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.en\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\PlayReady\Cache\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\RAC\Temp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\RAC\Temp\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\User Account Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\ar\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\cs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\en-US\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\hu\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\it\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DeviceMetadataStore\ru\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\Cache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\DRM\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{0f8ade68-df58-4eae-a24a-e238d634bf55}\PlayTasks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{0f8ade68-df58-4eae-a24a-e238d634bf55}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{6E7DD52D-205E-4D6D-AF6A-0C34703DFA61}\PlayTasks\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{6E7DD52D-205E-4D6D-AF6A-0C34703DFA61}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\GameExplorer\{A4B598D2-9BFF-456F-A667-D3B8A0849286}\PlayTasks\0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Manifest\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Sessions\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows\Sqm\Upload\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\Resources\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\CleanStore\Resources\F7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\CacheManager\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Quick\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Results\System\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows Defender\Scans\History\Store\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows NT\MSFax\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Microsoft\Windows NT\MSFax\SentItems\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Agent\Repository\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\MetaData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Nero\Nero 10\OnlineServices\PushMarketingFeeds\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\00000582\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\00000082\0000011a\00000582\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\NortonInstaller\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\NortonInstaller\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\onlybackground\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\OOBEOffer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\Power Management\Log\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\oem\ScreenSaver\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Oracle\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Oracle\Java\installcache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\634739380139197661\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Download\application\fixpack\634739380139197661\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Info\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\Info\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Packard Bell\Packard Bell Updater\UnzipTemp\130556135368468542\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\ParetoLogic\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\ParetoLogic\UUS3\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\Qualcomm Atheros Direct Connect\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Qualcomm Atheros\Qualcomm Atheros Direct Connect\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\css\platform\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\black-on-white\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\black-on-white\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\images\normal\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\Apps\login\languages\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{AA59DDE4-B672-4621-A016-4C248204957A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Skype\{AA59DDE4-B672-4621-A016-4C248204957A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Sun\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Symantec\Norton Online Backup\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{64EF903E-D00A-414C-94A4-FBA368FFCDC9}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{A0382E3C-7384-429A-9BFA-AF5888E5A193}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{E3739848-5329-48E3-8D28-5BBD6E8BE384}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Temp\{E3739848-5329-48E3-8D28-5BBD6E8BE384}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\AppIcons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\Visan\AppIcons\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameData\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameDiscovery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameInstalls\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\GameInstalls\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Logs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Updater\GameConsole\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Updater\GameConsole\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\Users\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\Downloads\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\settings\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\ProgramData\WildTangent\WildTangent Games\App\settings\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recovery\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$R0HHWWJ.txt" sh=FBC2F388E12E8EDEF676CE8B90F5CE7BA549F218 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSS1Y92.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$R3T41C3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RJ7IKOM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RKC5W46.template\Contents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\Contents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$ROMIIDS.template\thumbs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\Contents\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\thumbs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSGS5S3.template\thumbs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\1R4QXALK\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\37K2BJO3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\63R6CY63\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\VJ94CHDA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSN65CP\Content.IE5\VJ94CHDA\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RSNLNHW.template\thumbs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RUHUWPP\History.IE5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Recycle Bin\S-1-5-21-2638333503-4185592900-734640502-1000\$RZBX108.template\thumbs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\sh4ldr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Acrobat\10.0\Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Color\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Adobe\Color\Profiles\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Apps\2.0\BG66ZQ4X.QHA\QV20VO14.8YL\manifests\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\CyberLink\Youcam\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Diagnostics\460911090\2016032619.000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\EmieUserList\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\EmieUserList\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Google\CrashReports\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Hewlett-Packard\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Hewlett-Packard\HPDIA\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\003\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\005\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\005\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\006\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\006\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\007\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\007\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\008\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\011\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\011\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\015\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\018\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\021\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\026\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\028\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\029\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\030\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\032\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\AtInstall\032\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\HP Photosmart 5510 series\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\nl-NL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Assistance\Client\1.0\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\jscrollpane\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Bing Bar Settings_ac63306dfaef4dd89310251954aea031\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\footer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Error Application_6685fcaddd1644138dfc117bdf47c3e6\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\footer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\images\notifications\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\7.0.765\js\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\FacebookLike_08e57417866d4faa981702780b0d36c4\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Facebook_76c7b5062c4e4be69d843ace834517ec\7.0.765\loc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\GeoService Application_9fe4b7bf745a416c9858724091e7b720\7.0.765\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\notifications\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\images\notifications\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\7.0.765\providers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Mail_15642ee020d2449d86382022aa6f2548\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\css\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\jscrollpane\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\jscrollpane\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\MAPBJewel_4fb47f97fcff425e81c1196d3e059c83\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\images\buttons\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Maps_e4b69397ea59436c9d8611b45fdb79f9\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Search_6f21d9007fa34bc78d94309126de58f5\VersionIndependent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\js\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\loc\nl-be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\mocks\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\7.0.765\mocks\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Toast Application_d97e92f94d53425fbcf0f2a04b8e5426\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\js\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\7.0.765\loc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Translator_f5cbd3ef4c144434b17913278004e270\VersionIndependent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\images\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\images\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\js\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\loc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\7.0.765\loc\nl-be\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\VersionIndependent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\videos_6064022068cb4bd18a6a06908597e0d8\VersionIndependent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\css\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\footer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\images\buttons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\Apps\Weather_63630244a02f4e4cb6cb9b09b2f886f3\7.0.765\images\buttons\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\System\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingBar\System\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\BingSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\34e548a8-3268-4dde-bedf-c40f9b6c814a\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\en-us\aa874297-adea-49b9-a0f9-d2ac67191254\DeviceInformation\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Device\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Device\nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\DeviceStage\Task\{62275ce5-ec7d-4b53-9b11-355271e6e178}\nl\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\SoftwareInfo\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Device Metadata\dmrccache\nl\f88426d5-d6c6-4baa-a954-011c4d31f950\SoftwareInfo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Event Viewer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\4AB3DEOP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\7PK314DN\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\7PK314DN\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\CV5X3GVA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Feeds Cache\KBT9G2G3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\FORMS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IME12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IME12\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP12\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP8_1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\IMJP9_0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\9ZC8BSG7\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\9ZC8BSG7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\I6O7TQCL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\IXSLFRIU\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\TS4R3R6S\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\DOMStore\TS4R3R6S\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Pinned Sites\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\High\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10224758000\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10323245420\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-10689114170\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-11892234470\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-15705535740\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18187976470\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2375398810\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2813849570\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6397009680\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8255704550\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin10059975020\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin10059975020\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14080290840\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14690366770\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14802782150\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin14912218160\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin15711633250\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin15711633250\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin1682904900\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin19636395310\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20867721010\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20867721010\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin4529079810\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin4529079810\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5559899540\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin557149200\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin557149200\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5697298620\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin5697298620\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin6797759040\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\UrlBlockManager\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\UrlBlockManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Internet Explorer\VersionManager\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\Groove\System\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\Groove\User\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Office\UnsavedFiles\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Outlook\RoamCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\PlayReady\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Portable Devices\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1024\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\1033\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\AppCache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Burn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\GameExplorer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016030720160314\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016031420160321\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016032120160328\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016032820160329\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012016033020160331\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\History.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\History\Low\History.IE5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Ringtones\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Ringtones\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\02Q9V010\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\+REcovER+voevt+.txt" sh=AD85904036D108541D85174005AF08A9C05073B0 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0MOQ3S5L\f[8].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6JX8XB2P\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F3H5WVXM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F3H5WVXM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPDEUBUS\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LZ0HNIDB\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LZ0HNIDB\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NU9GV3X0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OJEZ0M71\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OJEZ0M71\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q07D6RRU\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TPO80MJ6\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TPO80MJ6\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WC10QHYV\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YTDAPJM6\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\722TPXG8\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\+REcovER+xjqwm+.txt" sh=2D724C0D2C02547F1FEF262411D016680D21C050 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\f[2].txt" sh=45B6AF556DBFCD9A814CD13E00897BEA74158D55 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\f[6]_9.txt" sh=2EC524B5D5D4D5305F1A07EC6DCF60B4026AA3AD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3ZXO9ZJN\get[1].txt" sh=BBC8FEB26050B595339119753350979B09343C2D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\fLRAC5QT8.txt" sh=5F4955E6768C7872A0270EEC72E2A236553C34E3 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\f[6]_7.txt" sh=B78A488727E573A6371000CA47FCD6813D5A3F45 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4GZAOZXV\f[7]_4.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\+REcovER+xjqwm+.txt" sh=9DC87029EFC360C9C4382BD11261B27850F45F43 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6WUUIICI\f[2]_4.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\+REcovER+voevt+.txt" sh=ECF73DF3CC09CF12852D0072AE7D4A84C19473AD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\f72QVSIBD.txt" sh=98ADB2B0CC6F6F9B5E07281ECB552E20D648D6D5 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7FQNXQGD\fIZOOWIX8.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\+REcovER+qmsnc+.txt" sh=579EB4FACF5F3648BDA7958DE0A932BF72ED8E0B ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\fIHLIJVL0.txt" sh=B3ED274658B0973FADAD31639CA07E8535CE3D4D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\8DR7XQIT\f[9].txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\+REcovER+pbble+.txt" sh=75371C2E2CADEDE76969E622C697A14A1AFCE2FF ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\f[6]_3.txt" sh=D38D0B2BB08A2E645051342D46197CB8B4C3373C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\9QSECKHT\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\+REcovER+xjqwm+.txt" sh=08AB3B47CD11627CCC7282F87E85562045089588 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\fTA7RBILD.txt" sh=24402F514E07E1AA0BD780D1B47437986CEA7CDA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\fU40JRS3C.txt" sh=90E7C29C1137A34614B8D7EB37C275C2B965B096 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\CR101IQY\f[3]_7.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JSZRKHG8\+REcovER+xjqwm+.txt" sh=331F3C2B92A8AE3AFD2DDD7BCFF3BB9FB2BA9C92 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JSZRKHG8\f[5]_11.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\+REcovER+qmsnc+.txt" sh=BC189E142D6EFDB79DF4B624AE51C462CB41C25C ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TC3S81YQ\f[8]_1.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\+REcovER+qmsnc+.txt" sh=135A545DF1FAECB9C7874BF1F5C33EBA40B90861 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\f1QN5BIDW.txt" sh=9894BEF770F2CF84BCC59B847A555C4B675B5F3B ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TXV436HH\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VILRM7L9\+REcovER+qmsnc+_1.txt" sh=2FDE0B346D7004A62A58C029B61A5C32EE041719 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\W0CDSEAZ\fCS1BWGJL.txt" sh=3AE23BA0A8769308796AE4B8F2EED9BD2BC3CA28 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\W0CDSEAZ\f[7]_3.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\ProgramData\Visan\AppIcons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Media Player\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Caches\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Explorer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Libraries\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Desktop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\1_DoorTeSturen_Skynet2\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061111_Fantasia\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061221_5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061906_Barbara18\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20061906_Barbara18\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070417_FortisLadies&Loena\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070417_FortisLadies&Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070816_Walibi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20070816_Walibi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071117_Fantasia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071225_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20071225_Kerst\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080117_GBritain\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080307_Carnaval_Bab\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080316_Galabal-EHSAL\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20080327_Ardennen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20090328_DoopVince\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100811_TuinhotelLommel\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100822_Thierry50\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20100822_Thierry50\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20101231_Kerst\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20120811_Winterbanden\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130104_NieuwJaar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130203_Toby\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130316_Dirk40\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130316_Dirk40\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130513_VerjaardagSofieBern\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130620_BBQ_Hippelenberg\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130720_Els40\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130803_Hip\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130803_Hip\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130807_Patje54\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130816_ZomerVakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20130824_ElsDirkFeest\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20140801_Vakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\20140802_Plopsaland\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\AP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Barbara\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Patrick\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Patrick\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sample Pictures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Soeshi\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Soeshi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sofie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\C\Users\Anne&Patrick\Pictures\Sofie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{117E056F-22CE-42AD-B55E-6FB5E9214531}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{117E056F-22CE-42AD-B55E-6FB5E9214531}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{164DE11A-4804-4D90-B029-A47DC4FEB159}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{2B76C140-6EA6-4B2D-9554-5DEC717F09D2}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5A807C32-DAC7-4088-B82F-0DA90C1DA34D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5C6A6380-DADA-4CDC-B34B-FB449503F679}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{788ADD43-12B6-40F4-B0CD-236C848311C0}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{9F45E1DE-8761-4238-81B3-099A28940D94}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{9F45E1DE-8761-4238-81B3-099A28940D94}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B0E0F08F-DAD7-4BDF-A377-B5AA98C76B56}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B0E0F08F-DAD7-4BDF-A377-B5AA98C76B56}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\Temporary Internet Files\{B196D788-134E-45CA-BE84-393E25CB1D2F}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows\WER\ERC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Bici\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\Installer\Catalog\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Movie Maker\SqmApi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Live Photo Gallery\SqmApi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\Windows Mail\Stationery\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\CabLogs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft\WLSetup\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Microsoft Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\24e3bb24-6f8a-4e06-a923-a920255afccb\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\77b7433c-cef2-402d-90df-e564967f303b\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\7c2aa315-69d5-4d13-89cd-3edb68028629\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Adobe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Adobe\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\BSvcUpdateConfig\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\BSvcUpdateConfig\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\cda4ef09-0da2-4fdf-b7be-f47ce3329c85\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\cda4ef09-0da2-4fdf-b7be-f47ce3329c85\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\AtStatus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\HP\AtStatus\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\lilo.3340\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Low\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\Low\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msdt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\msohtmlclip1\01\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\snsCDBB.tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Temp\snsCDBB.tmp\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Accessory Store\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Accessory Store\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\BDrvK57Inst\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\BDrvK57Inst\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\MS\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\SD\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\SD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Broadcom\MemoryCard\XD\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\Media SDK\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Intel\Media SDK\s1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Common Files\Lavasoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DIFX\4CBAA680AB78144E\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Full\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\OldAge\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Performance\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Pets\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Push\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Sports\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Stacking\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Travel\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\DVD Maker\Shared\DvdStyles\Vignette\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\Bin\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\Bin\utils\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\HPRestStub\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\NGScanDriver\drivers\scanner\x64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\amd64\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\HP\HP Photosmart 5510 series\DriverStore\Pipeline\i386\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\iCLS Client\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\DAL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IPT\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IUS\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Intel\Intel(R) Management Engine Components\IUS\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Ad-Aware Antivirus\11.10.767.8917\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Lavasoft\Ad-Aware Antivirus\Antimalware Engine\3.0.99.0\definitions\loc2\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Backgammon\nl-NL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\nl-NL\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Checkers\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Games\Multiplayer\Spades\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\Office14\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Office\Office14\1033\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ar\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ar\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\bg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ca\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\cs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\da\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\de\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\el\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\es\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\es\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\et\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\eu\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fi\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\fr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\he\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hr\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\hu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\id\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\it\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ja\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ko\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+wdqfv+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ms\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\nl\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\no\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt-BR\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\pt-BR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ro\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\ru\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Cyrl-CS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Latn-CS\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sr-Latn-CS\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sv\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\th\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\tr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\uk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\uk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\vi\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\vi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\zh-Hans\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Microsoft Silverlight\5.1.41212.0\zh-Hant\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\cs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\sk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\sl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\tr\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Power Management\zh-CHT\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\bg\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\et\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\HelpFile_P\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\tr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NotificationCenter\zh-chs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Recovery Management\NoUSB\HelpFile_E\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\da\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\no\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\ru\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\sk\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Packard Bell Updater\Help\Image\zh-cht\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\Registration\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Packard Bell\remote\icon\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\7digital\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\7digital\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Preload\Eurosport\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Realtek\Audio\HDA\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Reference Assemblies\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Uninstall Information\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mail\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ar\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ar\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\bg\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ca\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\cs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\cs\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\da\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\da\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\de\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\el\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\en\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\es\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fi\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\fr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\he\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hu\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\hu\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\it\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-br\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\pt-pt\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\ru\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\sl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Live\Mesh\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\nl-NL\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Photo Viewer\nl-NL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\Program Files\Windows Portable Devices\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\BBSvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\SeaNote\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\BingBar\SeaPort\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\HTML Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Media Player\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\MSDN\8.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\NetFramework\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.nl-nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Access.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Catalog\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office.nl-nl\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Office64.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\OneNote.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Outlook.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\PowerPoint.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.de\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.en\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.fr\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.fr\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Proofing.nl-nl\Proof.nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.nl-nl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Publisher.nl-nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\SingleImage.WW\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OEMOffice14\Office14\Word.nl-nl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OFFICE\UICaptions\3082\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OFFICE\UICaptions\3082\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\OfficeSoftwareProtectionPlatform\Cache\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Windows Live\SOXE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{2CDA08B9-FC69-472A-85A7-C00B4D8B0F12}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{68CD74BA-3E32-41C6-B357-D48813421A1F}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\{68CD74BA-3E32-41C6-B357-D48813421A1F}\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\CabLogs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WLSetup\Logs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft\WwanSvc\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Microsoft Help\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Oracle\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\VirtualStore\ProgramData\Oracle\Java\javapath\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\Windows Live\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{094D2A37-C34E-4D89-B221-C1966F2968EC}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{094D2A37-C34E-4D89-B221-C1966F2968EC}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{8E66D222-C922-425E-9E80-F00C51CE937D}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{C9A16F2D-424D-426B-8694-3953EB34F77A}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{C9A16F2D-424D-426B-8694-3953EB34F77A}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Local\{E853E5C1-FE1C-4540-A340-17E67135CF7B}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Search\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Search\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\inprogress\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\inprogress\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\metadata\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Acrobat\10.0\Synchronizer\resources\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\fin\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\frn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\heb\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\hrv\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\hun\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\itl\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\lav\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\slo\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\spn\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\swd\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Adobe\Linguistics\Dictionaries\Adobe Custom Dictionary\tur\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\EmieUserList\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\SmartPrint\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Hewlett-Packard\SmartPrint\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\emulation\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\header\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\F12\perftools\memory\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP8_1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\IMJP9_0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\1EHG9FVK\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\667JPIZW\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\667JPIZW\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\99H7C3F4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\99H7C3F4\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\BW6TTPD7\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\w89352q\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Internet Explorer\iconcache\w89352q\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\InBrowser\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\InBrowser\Profiles\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\143mdabquekm1fd2m03eupc40kdkeelh03tzp13otg3gw2kf1uaaahaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\143mdabquekm1fd2m03eupc40kdkeelh03tzp13otg3gw2kf1uaaahaa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\2er4le0id2hz1odtqyz4o3kcuao4bx2jgsyevunqnlpqkkulmjaaadha\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ffu532zwpa43ne3jpietmvbxcfzerriqjjpzjposx43ixgn4e2aaaeaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ffu532zwpa43ne3jpietmvbxcfzerriqjjpzjposx43ixgn4e2aaaeaa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\p51orcq5nfjbjlxs01ft5uv0kid1mo2hyhukdj3lyzdbmkeumuaaabca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\g\ujsacomylzhslwkoc1jhgdwhewmugwssfwui5aaqmorvata4ljaaahca\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\l\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\l\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\5abztsgz4bkxiu30ciiroazkkoijfxeaaukznn50dh1ijngbeyaaabaa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\5abztsgz4bkxiu30ciiroazkkoijfxeaaukznn50dh1ijngbeyaaabaa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\f1tstzndxbxu44tklf4alaxaztamgn45er5r3yiiweh12cidykaaahfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\f1tstzndxbxu44tklf4alaxaztamgn45er5r3yiiweh12cidykaaahfa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ifzbayxlnqjlmpoauehuepeje4nhzwascnrluahawaueznm0etaaaaea\f\AvatarCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ixlvwfia5nv50mwi1jdvturdwolt1bupud12ckuxjcmqbzgqueaaagga\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\ncqeygtiagsbevlwfpnhvvodbanrnxaivddijr4f0g0dm1tcqgaaagha\f\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\pnsdpvtb5exgchyg03smstegrqs5kzr50c1qg51ibdd01qibu2aaagfa\f\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\AvatarCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\uis0ata3ecobrd5r5xk5gha1d4rna5xpgvpfa4okomhgws4ldpaaaaea\f\AvatarCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Silverlight\is\fohr12mt.5tb\pkboi5si.sxa\1\s\zkvtvr5l4ohfe0ygrsal0viycrig2mbfjj55nhnrrlrdwwqampaaabga\f\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\KD62R2A3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Microsoft\Windows\AppCache\KD62R2A3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\AU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Oracle\Java\AU\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\AU\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\cache\security\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\ext\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\log\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\tmp\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\Deployment\tmp\si\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\LocalLow\Sun\Java\jre1.8.0_51\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Collab\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Forms\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\JavaScripts\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Preferences\Redaction\NLD\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Security\CRLCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Stamps\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Acrobat\10.0\Stamps\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\AssetCache\D4N7QTVX\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Flash Player\NativeCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Headlights\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Headlights\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Adobe\Linguistics\Dictionaries\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\CyberLink\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\HpUpdate\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Identities\{3FEC8642-B218-4439-A590-38BAF85706EF}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Identities\{3FEC8642-B218-4439-A590-38BAF85706EF}\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\+REcovER+voevt+.txt" sh=0000000000000000000000000000000000000000 ft=- fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\cdnapi.kaltura.com\html5\html5lib\v2.41\modules\EmbedPlayer\binPlayers\kaltura-player\plugins\akamaiHDPlugin.swf\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\opf.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\player.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\s.ytimg.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\services.vrt.be\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\static1.koken.vtm.be\sites\all\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\static1.koken.vtm.be\sites\all\modules\vmma\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\www.tripadvisor.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\4E7UCFQL\www.wezooz.be\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#player.ooyala.com\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static1.dmcdn.net\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#static1.koken.vtm.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.e-lotto.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#www.wezooz.be\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Media Center Programs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Media Center Programs\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Access\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\AddIns\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Clip Organizer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\CLView\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\CLView\1033\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Credentials\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\RSA\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Excel\XLSTART\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Excel\XLSTART\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP10\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP12\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP8_1\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\IMJP9_0\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\7e4dca80246863e3\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\7e4dca80246863e3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\9d91276b0be3e46b\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\MMC\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Office\Recent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Outlook\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\PowerPoint\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\PowerPoint\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Proof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Proof\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Protect\S-1-5-21-2638333503-4185592900-734640502-1000\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Queries\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Anne_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Reply_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Reply_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Slot_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Signatures\Slot_files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\nl-BE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Spelling\nl-BE\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Stationery\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Stationery\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Sticky Notes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Sticky Notes\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Colors\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Colors\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Effects\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Effects\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Fonts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\Document Themes\Theme Fonts\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Templates\LiveContent\User\Document Themes\1033\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\UProof\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Vault\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\+REcovER+pbble+.txt" sh=FB4AF46A47A014BFCF34113118F9D487F84C5491 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\1KJS3KR6.txt" sh=FCE8A09CA193EDD23CFC183EF329547AFF4F12B0 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\D845BPF9.txt" sh=45038BB64628D13C3BA3343FA2B8EFC5E3C5E6E8 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\DFC73P5Q.txt" sh=6EB872CFC49664E28DA3842BF539B35AD66F06AE ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\ISZDUNPV.txt" sh=E24BAD6B6E385D4672FE54151AF7EB54AD540DDD ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\KFAB12OD.txt" sh=E1316D1524011D72F9054E1AE0F08A0CA595AB06 ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\LP8TX8KW.txt" sh=C7942E209206E1EE354DD43ABE7F957767E3E71D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZXW9TS92.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DefaultPack\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DefaultPack\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\DNTException\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatUACache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\IETldCache\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Network Shortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\SendTo\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Templates\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows\Themes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Windows Live Photo Gallery\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\Microsoft\Word\STARTUP\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\ParetoLogic\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\ParetoLogic\PC Health Advisor\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\Analytics\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\Logs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\bejeweled3\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\chuzzledeluxe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\chuzzledeluxe\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\fate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\finaldrivenitro\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelmatch3\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelquestmysteries7thgate\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\jewelquestmysteries7thgate\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\johndeeredrivegreen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\johndeeredrivegreen\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\penguins\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\penguins\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\plantsvszombies\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\polarbowler\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\polarbowler\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\slingodeluxe\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\slingodeluxe\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\torchlight\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\virtualvillagers4thetreeoflife\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\weddingdash\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\weddingdash\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\MyGames\zuma\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\Settings\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\AppData\Roaming\WildTangent\WildTangent Games\App\Settings\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Contacts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\browser\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\browser\searchplugins\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\fonts\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\firefox\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\cache2\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\safebrowsing\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\Caches\profile.default\thumbnails\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\bookmarkbackups\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\content\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ach\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\am\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ast\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bal\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\be\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bg_BG\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\brx\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\bs\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ca\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\co\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\csb\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\cs_CZ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\de\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\dz\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\es_AR\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\et\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\eu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fil\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\fo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ga\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gd\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\gu\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ha\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\he\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\hr\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\km\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\kn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ku\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ku_IQ\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ln\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\lv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ml\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\mn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ps\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\pt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ro\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ru\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ru@petr1708\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\scn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sco\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sn\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\so\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sr@latin\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\st\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\su\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sv\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sv_SE\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\sw\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\szl\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ta\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\te_IN\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\tg\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\th\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ti\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\tl_PH\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ug@Arab\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\uk\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ur\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ur_PK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\uz\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\ve\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\vi\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\wa\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\zh_CN.GB2312\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extensions\https-everywhere-eff@eff.org\chrome\locale\zh_HK\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.meek-http-helper\extensions\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\Debroyer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\Debroyer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\cache\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\com.google.android.apps.magazines\files\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\1\flipboard.app\files\cache\downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\com.google.android.apps.magazines\cache\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\com.google.android.apps.magazines\files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Anne\S5\2\flipboard.app\files\cache\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\ACV\Vakbondspremie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Adres\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Budget\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\Borstonderzoek\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Mutualiteit\CM\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\New_PC\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Belgacom\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Belgacom\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Proximus\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Telecommunicatie\Telenet\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\HealthCare_AG\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\HealthCare_AG\20150127_Bril_Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Verzekering\Raam_Badkamer_Links\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2014\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2015\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Attesten\2016\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Loon\JaarOverzicht\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Pensioen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_10240\Pensioen\2015\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Attesten\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\Neten\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Brieven\Neten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Functie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000001\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000002\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000004\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000002\00000005\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000005\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000006\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000006\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000007\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000007\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000008\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000003\00000008\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\DICOM\00000004\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000002\00000004\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000004\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000005\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\00000003\00000006\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000001\00000001\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000002\00000005\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000001\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000003\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000003\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000003\00000008\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000004\00000001\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\IHE_PDI\SMALL\00000004\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\OsiriX Lite.app\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\OsiriX Lite.app\Contents\Resources\OsiriXDB_DataModel.momd\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000002\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000002\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000003\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\MedischDossier_StMaria\REPORTS\00000003\00000001\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\AP\Werk_3676\Pensioen\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Barbara\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\AGInsurance\Familis\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\AGInsurance\MedischeBeroepen_66130613\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Alarm\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Bank\Rondo\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Huisvuil\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\KI\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Persoon\AJ2015_Inkomsten2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\C1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Belastingen\Verkeer\C3_Picasso\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Bril\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Bijdrage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\HomeTrainer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\HomeTrainer\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Terugbetaling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\Voorhuwelijkssparen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\CM\ZorgVerzekering\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Dats\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Dats\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\DeLijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Electrabel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\LaRedoute\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Proximus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\SintMaria\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Verwarming\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Facturen\Verwarming\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Drafts\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Drafts\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Inbox\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Fax\Personal CoverPages\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\AutoRadioCD_C1\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Bladzuiger\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Boormachine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Droogkast\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Keuken\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Keuken\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Kleine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Frigo_Kleine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Grasmachine\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\GSM\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\GSM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\PC\PackardBell_MediaMarkt_20121027\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Stofzuiger\Voordeelvanger\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Verwarming\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Verwarming\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\20150128_Miele\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Gebruiksaanwijzing\Wasmachine\20150128_Miele\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\My Data Sources\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Leger\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ma\BelastingPa\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ouders_Home\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Ouders_SVHG\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Begrafenis_Coomans\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Muziek\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Documents\Patrick\Overlijden_Pa\Pensioendienst_Overheidssector\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\ATAG\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\ATAG\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Links\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Favorites\Online_Documents\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Music\Sample Music\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20061111_Fantasia\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20061221_5\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20070108_Decoratie25\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\Foto's\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071028_Berlijn\Foto's-berlijn\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20071117_Fantasia\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080117_Engeland\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080117_GBritain\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080130_Carnaval\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080327_Ardennen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080329_Vince\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080329_Vince\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080515_Amsterdam\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080620_Ouders50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080727_Sylvie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080727_Sylvie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080808_Lissabon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20080815_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081025_K3\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081115_Fantasia\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081129_Boone\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081129_Boone\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081225_Kerst2\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20081227_JP\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090131_Nestor\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090801_Bodrum2\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090814_Leuven\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090815_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20090912_Faye5\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091031_Appart_Sofie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091114_Move\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091114_Move\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20091225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100110_NewYear_ElsDirk\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100401_Pasen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100401_Pasen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100524_Sofie25\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100619_Barbara22\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100626_Wali\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100701_Allerlei\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100701_Allerlei\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100726_FayeVince\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100726_FayeVince\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100801_Poes\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100808_Patrick51\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20100828_Anne50\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101114_Nelly\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101225_Kerst\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101225_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20101231_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110501_Pasen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110601_CLB\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110701_Buurt\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110701_Buurt\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20110807_Verlof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120401_CommunieFaye\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120531_RaamBadkamer\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120801_Zomer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120831_Zomer\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20120922_Efteling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Dag1_Zondag\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Dag4_Woensdag\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130203_Toby\Week1\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130323_NadinePascal30\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130428_CommunieXander\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130519_Nestor70\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130620_BBQ_Hippelenberg\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130810_Gert\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130816_ZomerVakantie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130824_ElsDirkFeest\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20130901_Faye9\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140626_AnnAlain\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140801_Vakantie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140802_Plopsaland\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140811_DeResidentie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140811_DeResidentie\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140823_SoniaYvan\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140830_VerjaardagAnne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20140830_VerjaardagAnne\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141207_KerstCollishop\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141207_KerstCollishop\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141224_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141224_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141228_Kerst\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141228_Kerst\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141230_Zee\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20141230_Zee\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150102_Leuven\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150131_Toby2\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150207_DeKempeneer\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150216_Bowling\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150628_BBQLauraKarel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150628_BBQLauraKarel\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150629_Tess\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150718_Zeeland\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\20150722_ZeeToby\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Anne\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Adres\Huis\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Halle\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\Borstonderzoek\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\CM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\Euromut\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Mutualiteit\PreventieveGeneeskunde\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Belgacom\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Proximus\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Proximus\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Telecommunicatie\Telenet\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Verzekering\Raam_Badkamer_Links\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Attesten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Loon\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Loon\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_10240\Pensioen\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Attesten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Brieven\Neten\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Kolonie\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Loon\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Scanned_Doc\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Verlof\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\AP\Werk_3676\Verlof\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Colli\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\ACV\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Auto\C1\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belastingen\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belastingen\Persoon\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\SamsungS4\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Belgacom\SamsungS4\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Bril\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Bijdrage\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Bijdrage\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Terugbetaling\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Voorhuwelijkssparen\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\Voorhuwelijkssparen\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\CM\ZorgVerzekering\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Dats\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Dats\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\DeLijn\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Facturen\Electrabel\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\flickr downloads\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\Aritech_CD34\Police_on_Web_Alarm\2014_police-on-web Afdrukken_files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\GSM\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\NikonCoolpix_Macro_20080826\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\NikonCoolpix_Macro_20080826\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PackardBell_MediaMarkt_20121027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PackardBell_MediaMarkt_20121027\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PC\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Gebruiksaanwijzing\PC\PackardBell_MediaMarkt_20121027\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2007\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2007\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2008\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2008\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2009\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2009\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2010\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2010\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2013\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2014\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\2015\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Huis\Beertsestraat\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Loena\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\My Videos\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Outlook Files\Fotos\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Hospitalisatie_Pa\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Ouders_Home\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Ouders_SVHG\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Overlijden_Pa\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Overlijden_Pa\Muziek\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Patrick\Peers\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Pictures\Tess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Start Menu\Programs\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Start Menu\Programs\SpyHunter\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick\Videos\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Local\Microsoft\Windows\Temporary Internet Files\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Local\Temp\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Roaming\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\Favorites\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Anne&Patrick.Bjarke\Music\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Desktop\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Documents\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Downloads\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Default\Saved Games\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Favorites\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Music\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Music\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\Sample Media\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\Sample Media\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Recorded TV\TempRec\TempSBE\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\+REcovER+voevt+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Symantec\SymSilent\ccLog\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Users\Public\Videos\+REcovER+xjqwm+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\+REcovER+qmsnc+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+iectj+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+pbble+.txt" sh=EB43F46668AA35F06F96241DAA9EFD43EE7AF4EA ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{464a8b5f-ae1b-47c8-91ea-3e13462bfe79}\boost_interprocess\+REcovER+xjqwm+.txt" sh=399AA69097C137CD73942E23B8A59993C3B3317D ft=0 fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\System32\WindowsPowerShell\v1.0\nl-NL\about_requires.help.txt" sh=0000000000000000000000000000000000000000 ft=- fh=0000000000000000 vn="Win32/Filecoder.TeslaCrypt trojan (deleted)" ac=C fn="C:\Rec_2016\Data Recovery 2016-04-06 at 17.50.49\C\Windows\winsxs\amd64_cxfalpal_ibv64.inf_31bf3856ad364e35_6.1.7600.16385_none_db4796019d20adcb\wow64_microsoft-windows-p..ooler-networkclient_31bf3856ad364e35_6.1.7601.18142_none_a1cb5bc2bc049658\+REcovER+pbble+.txt"