Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Multiple malwares on my computer [Solved]

dllhost.exe*32 chrome*32 decrypt instruction

  • This topic is locked This topic is locked

#31
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

Sorry that I missed working with you yesterday. We had a huge snow storm in my part of the country and lacked power for most of the day!

 

When ESET completed, did it indicate that Poweliks was found?

 

In any case, could you re-run ESET and see what message is displayed and what the log looks like now?


  • 0

Advertisements


#32
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Yep, the joys of living where we get true winter!  We had a lot of snow last winter, and I had one storm that knocked out power for over 36 hours.  Slept in three layers with two blankets in the living room where the fireplace provided heat!  Don't know how the pioneers survived.

 

I did run ESET, as I recall there was one poweliks, and I told it to remove it.  You've got the log in the previous post.  I tried to run it again and I keep getting the message that no poweliks were found.  The only option it gives me is to press any key to close.

 

Should I try something else?


  • 0

#33
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

I tried to run it again and I keep getting the message that no poweliks were found.

 

That is great news!! I think we may have fixed that one!

 

Ok, this is a different version of ESET. It does a deep scan for things that we might have missed. It sometimes takes a while to run, so maybe let it run overnight.

 

ESETOnline.png Scan with ESET Online Scanner

This step can only be done using Internet Explorer, Google Chrome or Mozilla Firefox.
Temporary disable your AntiVirus and AntiSpyware protection - instructions here.
Please visit ESET Online Scanner website.
Click there Run ESET Online Scanner.

If using Internet Explorer:
  • Accept the Terms of Use and click Start.
  • Allow the running of add-on.
If using Mozilla Firefox or Google Chrome:
  • Download esetsmartinstaller_enu.exe that you'll be given link to.
  • Double click esetsmartinstaller_enu.exe.
  • Allow the Terms of Use and click Start.
To perform the scan:
  • Make sure that Remove found threats is checked.
  • Scan archives is checked.
  • In Advanced Settings: Scan for potentially unwanted applications, Scan for potentially unsafe applications and Enable Anti-Stealth technology are checked.
  • Click Start
  • The program will begin to download it's virus database. The speed may vary depending on your Internet connection.
  • When completed, the program will begin to scan. This may take several hours. Please, be patient.
  • Do not do anything on your machine as it may interrupt the scan.
  • When the scan is done, click Finish.
  • A logfile will be created at C:\Program Files (x86)\ESET\ESET Online Scanner. Open it using Notepad.
Please include this logfile in your next reply.

Don't forget to re-enable previously switched-off protection software!

 

Then, follow up with one more FRST scan so I can see what it looks like :)

 

Pending that outcome, I will then remove all my tools and give some Prevention Instructions :thumbsup:


  • 0

#34
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

I'm being asked for Proxy Server Settings.  It won't go further without that information.


  • 0

#35
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

Are you saying the Eset is asking for Proxy Settings or something else is asking?

 

Are you using a Proxy?


  • 0

#36
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Yes, sorry, the ESET is asking for the info.  On the screen where I check the advance settings there is a choice about proxy settings.  I didn't check it the first time because you didn't have anything about it in your instructions, and got a message about it, so I checked it the second try but got the same message, then it opened a window for user name and password.  I'm sorry I can't be more specific, I'm at work and don't have my notes in front of me.  I can give you more specific information when I get home at 5 if you need it.


  • 0

#37
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

You are not, at least to my knowledge, using a Proxy. If I'm wrong, please let me know. So, ESET should not be asking for one unless the infection set up one and we need to take it down. The following instructions might not be exact, but they should be close enough to get you there.

 

If you are using IE, try turning off Proxy this way

 

  1. Open Internet Explorer by clicking the Start button 4f6cbd09-148c-4dd8-b1f2-48f232a2fd33_818. In the search box, type Internet Explorer, and then, in the list of results, click Internet Explorer.
  2. Click the Tools button, and then click Internet Options.

  3. Click the Connections tab, and then click LAN settings.

Uncheck the Use Proxy box if it is checked.

 

In Firefox, Click Options, Advanced, Settings, unclick Proxy.


  • 0

#38
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

As far as I know, I'm not using a Proxy, but then I have no idea what that means or how it would have happened.

 

Okay, will be heading home in about 10 minutes and will get started on this.

 

I'll be in touch, one way or another.


  • 0

#39
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

I figured it out, somewhat.  Following your instructions, I found that I was not using a proxy.  So I started the ESET scan again, and while selecting the options, my intuition told me to see what was selected to be scanned.  My D drive was in the list, I had the flash drive plugged in!  So I removed that and deselected the D drive and it started running.

 

By 8:30 it was at 99% complete and had found 840 infected files! 

 

At 10pm it was still at 99%, so I left it running and went to bed.

 

This morning it is still hung up at 99% with 840 infected files, and is still at Step 3 of 4.  I left it running and came to work.

The file that it says it is scanning is the OTL.

 

What should I do?

 

I live 1.5 miles from work, so there is a possibility that I can go home at lunch to do something if need be.


  • 0

#40
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts
Let it run until you get home. Depending on volume size it may take take that long.

If its not done by the time you get home, kill it and let me know.
  • 0

Advertisements


#41
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Okay, it was still hung up at 99%, so I clicked 'stop' and page 4 opened with the option to finish, so I clicked that and found the log that I've posted below.  If it is incomplete, tell me what to do next.

 

 

ESETSmartInstaller@High as CAB hook log:
OnlineScanner64.ocx - registred OK
OnlineScanner.ocx - registred OK
esets_scanner_update returned -1 esets_gle=1
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
# product=EOS
# version=8
# iexplore.exe=11.00.9600.16428 (winblue_gdr.131013-1700)
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=
# engine=21134
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-18 10:41:32
# local_time=2014-11-18 04:41:32 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776573 100 94 0 167893942 0 0
# scanned=269140
# found=840
# cleaned=0
# scan_time=84781
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\$Recycle.Bin\S-1-5-21-977744973-2552835015-2244764293-1001\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\$Recycle.Bin\S-1-5-21-977744973-2552835015-2244764293-1001\DECRYPT_INSTRUCTION.TXT"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\ProgramData\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\DECRYPT_INSTRUCTION.HTML.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Public\DECRYPT_INSTRUCTION.HTML.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Public\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\Casedata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\Casedata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\ProgramData\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\Casedata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\Casedata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\Users\All Users\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML"
sh=E649E55EAE836B9D6B01233CEBFAFE2339873959 ft=1 fh=8337c2d698a9173e vn="Win32/Agent.WFF trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\ChromeUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML"
sh=6733165E3BC0F8D347AC3D5479731C6A9B50D8A8 ft=1 fh=58a1d71e670dc158 vn="Win32/TrojanDownloader.Cerabit.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\gxujio.dll"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT"
sh=33B7BF12D018C068655C8D9997013C8EA41BFDFF ft=1 fh=95e42e2d289f6aba vn="a variant of Win32/Kryptik.COQS trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Viarorhy\ulcyive.exe"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML"
sh=3650E00121F99F9899EAE3F85CC9925724A57040 ft=1 fh=0f11960c4468971c vn="Win32/TrojanDownloader.Wauchos.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Local Settings\Temp\msfbwf.cmd"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=F1C8C86B266B41EBE660991BE80E02503311B660 ft=1 fh=6140c315876ca764 vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\CyberLink\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=54CC272F4ADCEFA1C78EE21DD700D0B3924D9C41 ft=1 fh=e3d6dad680165ebc vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\visi_coupon\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT"
sh=BCA1A1B3ECE4DA83BCDE5497CA7F97F0DD2E77AF ft=1 fh=b4841c56cc775b08 vn="Win64/Agent.CM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=8FD10B37D749007B9550C9DF0DE702731F902B1B ft=1 fh=c06948dac8bdbf78 vn="a variant of Win64/Agent.CO trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\FrameworkUpdate7\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT"
sh=6080FA6F897D609503008FCB5AB28C4435876E5A ft=1 fh=a0b2106930b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Igqewoti\ygqely.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT"
sh=6A233118AA8F52D1F2FDA4D7373301B5D3FE1C97 ft=1 fh=028fa9e630b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Rumowuo\fyysira.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT"
sh=9C9E9C9F878011680FC76798FD95C43E5EC55785 ft=1 fh=e1712e256b9d55fa vn="a variant of Win32/TrojanProxy.Agent.NYP trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\ivijios.dll"
sh=EA72EA0B157A660AA62927F88B2C8B6F274AD6CD ft=1 fh=ddc67596b5b5a45c vn="Win32/Delf.OEH trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\svcxdcl32.exe"
sh=B6B85DDE35A91A62A76148B7F0E1DF290F151B9B ft=1 fh=466c90e004d3723a vn="a variant of Win32/Kryptik.CPLM trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\Temp\DHCPprxy.exe"
 


  • 0

#42
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

Gosh what a mess that infection made! Almost all those files are Text files that pretty much gave you a Ransom message no matter what you did. Let's see if we can clean those up quickly with an FRST fix and then try ESET again.

 

FRST.gif Fix with Farbar Recovery Scan Tool


 

icon_exclaim.gif This fix was created for this user for use on that particular machine. icon_exclaim.gif
icon_exclaim.gif Running it on another one may cause damage and render the system unstable. icon_exclaim.gif


Press the WindowsKey.png + R on your keyboard at the same time. Type Notepad and click OK.
 

  • Copy the entire content of the codebox below and paste into the Notepad document:
Move: c:*DECRYPT_INSTRUCTION.HTML*

Move: c:*DECRYPT_INSTRUCTION.txt*

DeleteQuarantine:

EmptyTemp:
  • Click File, Save As and type fixlist.txt as the File Name.

  • Both files, FRST and fixlist.txt have to be in the same location or the fix will not work!
    • Right-click on FRST.gif icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
      (XP users click run after receipt of Windows Security Warning - Open File).
    • Press the Fix button just once and wait.
    • If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
    • When finished FRST will generate a log on the Desktop, called Fixlog.txt.

 

 


  • 0

#43
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Okay, here's the latest fixlog:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 19-11-2014
Ran by Judy at 2014-11-19 17:15:32 Run:2
Running from C:\Users\Judy\Downloads
Loaded Profile: Judy (Available profiles: Judy)
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
Move: c:*DECRYPT_INSTRUCTION.HTML*

Move: c:*DECRYPT_INSTRUCTION.txt*

DeleteQuarantine:

EmptyTemp:
*****************

Could not find "Move: c:*DECRYPT_INSTRUCTION.HTML*"
Could not find "Move: c:*DECRYPT_INSTRUCTION.txt*"
"C:\FRST\Quarantine" => Removed successfully.
EmptyTemp: => Removed 1527 KB temporary data.

The system needed a reboot.

==== End of Fixlog ====


  • 0

#44
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Forgot to mention that I left ESET running, and just like last time it is hung up at 99%, so I'll let it go until I get home this evening. 

 

I did notice that it has over 700 infected files.  Should I tell the program to remove them when it gives me that option at the finish point?


  • 0

#45
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

Yes, delete the infected files :) Then rerun. We've got to knock them all out.


  • 0






Similar Topics


Also tagged with one or more of these keywords: dllhost.exe*32, chrome*32, decrypt instruction

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP