Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Multiple malwares on my computer [Solved]

dllhost.exe*32 chrome*32 decrypt instruction

  • This topic is locked This topic is locked

#46
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Okay, good.  :yes:  I wondered about that the last time I ran it, but there was nothing in the instructions, so I didn't.  Gee, guess that would have helped!


  • 0

Advertisements


#47
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Okay, there were 790 infected files, I told the program to delete quarantined files.  I ran another scan and there were 676 infected files, so I told the program to delete again.  I've tried twice to post the log, but I get a message that the post is too long, so I'm going to try to post in two messages.  Here's the first part:

 

ESETSmartInstaller@High as CAB hook log:
OnlineScanner64.ocx - registred OK
OnlineScanner.ocx - registred OK
esets_scanner_update returned -1 esets_gle=1
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
esets_scanner_update returned -1 esets_gle=41217
# product=EOS
# version=8
# iexplore.exe=11.00.9600.16428 (winblue_gdr.131013-1700)
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=
# engine=21134
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-18 10:41:32
# local_time=2014-11-18 04:41:32 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776573 100 94 0 167893942 0 0
# scanned=269140
# found=840
# cleaned=0
# scan_time=84781
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\$Recycle.Bin\S-1-5-21-977744973-2552835015-2244764293-1001\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\$Recycle.Bin\S-1-5-21-977744973-2552835015-2244764293-1001\DECRYPT_INSTRUCTION.TXT"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\ProgramData\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\DECRYPT_INSTRUCTION.HTML.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Public\DECRYPT_INSTRUCTION.HTML.xBAD"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\FRST\Quarantine\C\Users\Public\DECRYPT_INSTRUCTION.TXT.xBAD"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\Casedata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Corel\Casedata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\ProgramData\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\Casedata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Corel\Casedata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\Users\All Users\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML"
sh=E649E55EAE836B9D6B01233CEBFAFE2339873959 ft=1 fh=8337c2d698a9173e vn="Win32/Agent.WFF trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\ChromeUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML"
sh=6733165E3BC0F8D347AC3D5479731C6A9B50D8A8 ft=1 fh=58a1d71e670dc158 vn="Win32/TrojanDownloader.Cerabit.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\gxujio.dll"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT"
sh=33B7BF12D018C068655C8D9997013C8EA41BFDFF ft=1 fh=95e42e2d289f6aba vn="a variant of Win32/Kryptik.COQS trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Viarorhy\ulcyive.exe"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML"
sh=3650E00121F99F9899EAE3F85CC9925724A57040 ft=1 fh=0f11960c4468971c vn="Win32/TrojanDownloader.Wauchos.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Local Settings\Temp\msfbwf.cmd"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=F1C8C86B266B41EBE660991BE80E02503311B660 ft=1 fh=6140c315876ca764 vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\CyberLink\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=54CC272F4ADCEFA1C78EE21DD700D0B3924D9C41 ft=1 fh=e3d6dad680165ebc vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\visi_coupon\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT"
sh=BCA1A1B3ECE4DA83BCDE5497CA7F97F0DD2E77AF ft=1 fh=b4841c56cc775b08 vn="Win64/Agent.CM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=8FD10B37D749007B9550C9DF0DE702731F902B1B ft=1 fh=c06948dac8bdbf78 vn="a variant of Win64/Agent.CO trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\FrameworkUpdate7\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT"
sh=6080FA6F897D609503008FCB5AB28C4435876E5A ft=1 fh=a0b2106930b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Igqewoti\ygqely.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT"
sh=6A233118AA8F52D1F2FDA4D7373301B5D3FE1C97 ft=1 fh=028fa9e630b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Rumowuo\fyysira.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT"
sh=9C9E9C9F878011680FC76798FD95C43E5EC55785 ft=1 fh=e1712e256b9d55fa vn="a variant of Win32/TrojanProxy.Agent.NYP trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\ivijios.dll"
sh=EA72EA0B157A660AA62927F88B2C8B6F274AD6CD ft=1 fh=ddc67596b5b5a45c vn="Win32/Delf.OEH trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\svcxdcl32.exe"
sh=B6B85DDE35A91A62A76148B7F0E1DF290F151B9B ft=1 fh=466c90e004d3723a vn="a variant of Win32/Kryptik.CPLM trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\Temp\DHCPprxy.exe"
# product=EOS
# version=8
# iexplore.exe=11.00.9600.16428 (winblue_gdr.131013-1700)
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=
# engine=21173
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-20 12:20:18
# local_time=2014-11-20 06:20:18 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776573 100 94 0 168029468 0 0
# scanned=268848
# found=790
# cleaned=0
# scan_time=29576
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\ProgramData\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\aol\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\attach\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\symantec\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Hewlett-Packard\HP Advisor\basefeeds\hq\94\ec-base\attach\media\vongo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Help\QnueHTML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Banklist\2009\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Bullseye\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\Users\All Users\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML"
sh=E649E55EAE836B9D6B01233CEBFAFE2339873959 ft=1 fh=8337c2d698a9173e vn="Win32/Agent.WFF trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\ChromeUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML"
sh=6733165E3BC0F8D347AC3D5479731C6A9B50D8A8 ft=1 fh=58a1d71e670dc158 vn="Win32/TrojanDownloader.Cerabit.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\gxujio.dll"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT"
sh=33B7BF12D018C068655C8D9997013C8EA41BFDFF ft=1 fh=95e42e2d289f6aba vn="a variant of Win32/Kryptik.COQS trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Viarorhy\ulcyive.exe"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML"
sh=3650E00121F99F9899EAE3F85CC9925724A57040 ft=1 fh=0f11960c4468971c vn="Win32/TrojanDownloader.Wauchos.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Local Settings\Temp\msfbwf.cmd"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=F1C8C86B266B41EBE660991BE80E02503311B660 ft=1 fh=6140c315876ca764 vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\CyberLink\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=54CC272F4ADCEFA1C78EE21DD700D0B3924D9C41 ft=1 fh=e3d6dad680165ebc vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\visi_coupon\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT"
sh=BCA1A1B3ECE4DA83BCDE5497CA7F97F0DD2E77AF ft=1 fh=b4841c56cc775b08 vn="Win64/Agent.CM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=8FD10B37D749007B9550C9DF0DE702731F902B1B ft=1 fh=c06948dac8bdbf78 vn="a variant of Win64/Agent.CO trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\FrameworkUpdate7\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT"
sh=6080FA6F897D609503008FCB5AB28C4435876E5A ft=1 fh=a0b2106930b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Igqewoti\ygqely.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT"
sh=6A233118AA8F52D1F2FDA4D7373301B5D3FE1C97 ft=1 fh=028fa9e630b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Rumowuo\fyysira.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT"
sh=9C9E9C9F878011680FC76798FD95C43E5EC55785 ft=1 fh=e1712e256b9d55fa vn="a variant of Win32/TrojanProxy.Agent.NYP trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\ivijios.dll"
sh=EA72EA0B157A660AA62927F88B2C8B6F274AD6CD ft=1 fh=ddc67596b5b5a45c vn="Win32/Delf.OEH trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\svcxdcl32.exe"
sh=B6B85DDE35A91A62A76148B7F0E1DF290F151B9B ft=1 fh=466c90e004d3723a vn="a variant of Win32/Kryptik.CPLM trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\Temp\DHCPprxy.exe"


  • 0

#48
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Here's part 2:

 

# product=EOS
# version=8
# iexplore.exe=11.00.9600.16428 (winblue_gdr.131013-1700)
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=
# engine=21179
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-20 11:14:56
# local_time=2014-11-20 05:14:56 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776573 100 94 0 168068746 0 0
# scanned=268815
# found=732
# cleaned=0
# scan_time=39165
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\ProgramData\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\css\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Localweb\Qsystem\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Allocate\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Custcare\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\Intuit\Quicken\Inet\Common\Pnf\Pas\DECRYPT_INSTRUCTION.TXT"
sh=00D9F5E2E1A4B33547BC1341333881EC06EA2EFE ft=0 fh=0000000000000000 vn="Win32/Poweliks.C trojan" ac=I fn="C:\Users\All Users\RogueKiller\Quarantine\DD53E4470B6708F4.reg"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\clientSWF\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\flash\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML"
sh=E649E55EAE836B9D6B01233CEBFAFE2339873959 ft=1 fh=8337c2d698a9173e vn="Win32/Agent.WFF trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\ChromeUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML"
sh=6733165E3BC0F8D347AC3D5479731C6A9B50D8A8 ft=1 fh=58a1d71e670dc158 vn="Win32/TrojanDownloader.Cerabit.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\gxujio.dll"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT"
sh=33B7BF12D018C068655C8D9997013C8EA41BFDFF ft=1 fh=95e42e2d289f6aba vn="a variant of Win32/Kryptik.COQS trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Viarorhy\ulcyive.exe"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML"
sh=3650E00121F99F9899EAE3F85CC9925724A57040 ft=1 fh=0f11960c4468971c vn="Win32/TrojanDownloader.Wauchos.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Local Settings\Temp\msfbwf.cmd"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=F1C8C86B266B41EBE660991BE80E02503311B660 ft=1 fh=6140c315876ca764 vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\CyberLink\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=54CC272F4ADCEFA1C78EE21DD700D0B3924D9C41 ft=1 fh=e3d6dad680165ebc vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\visi_coupon\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT"
sh=BCA1A1B3ECE4DA83BCDE5497CA7F97F0DD2E77AF ft=1 fh=b4841c56cc775b08 vn="Win64/Agent.CM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=8FD10B37D749007B9550C9DF0DE702731F902B1B ft=1 fh=c06948dac8bdbf78 vn="a variant of Win64/Agent.CO trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\FrameworkUpdate7\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT"
sh=6080FA6F897D609503008FCB5AB28C4435876E5A ft=1 fh=a0b2106930b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Igqewoti\ygqely.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT"
sh=6A233118AA8F52D1F2FDA4D7373301B5D3FE1C97 ft=1 fh=028fa9e630b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Rumowuo\fyysira.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT"
sh=9C9E9C9F878011680FC76798FD95C43E5EC55785 ft=1 fh=e1712e256b9d55fa vn="a variant of Win32/TrojanProxy.Agent.NYP trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\ivijios.dll"
sh=EA72EA0B157A660AA62927F88B2C8B6F274AD6CD ft=1 fh=ddc67596b5b5a45c vn="Win32/Delf.OEH trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\svcxdcl32.exe"
sh=B6B85DDE35A91A62A76148B7F0E1DF290F151B9B ft=1 fh=466c90e004d3723a vn="a variant of Win32/Kryptik.CPLM trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\Temp\DHCPprxy.exe"
# product=EOS
# version=8
# iexplore.exe=11.00.9600.16428 (winblue_gdr.131013-1700)
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=
# engine=21188
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2014-11-21 02:48:41
# local_time=2014-11-20 08:48:41 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776573 100 94 0 168081570 0 0
# scanned=268803
# found=676
# cleaned=0
# scan_time=12475
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\ProgramData\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bejeweled2deluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blackhawkstriker2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\blasterball2drm3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\bobthebuilder\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\buildalot3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\chuzzledeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\dorascarnival\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\eighteenwheelshaulin\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\familyfeudthree\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\farmfrenzypizzaparty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\All Users\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{0BE902EB-122B-423E-9185-DBCD5E7124F4}\msiexec.exe"
sh=F37964DEC80F84F615FD251BD07BFE643A1EC5CB ft=1 fh=ccd94725cb49a411 vn="Win32/TrojanDownloader.Cerabit.B trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{1362E78D-AA5F-455C-BD78-81BCFE84325C}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{4A430353-813D-4371-9C50-72066B22DE12}\msiexec.exe"
sh=6E3880E417FC1B6630D72D7BC26C78F3B4EC4C30 ft=1 fh=414931f1e15deb0d vn="Win32/Filecoder.CO trojan" ac=I fn="C:\Users\All Users\Windows Genuine Advantage\{A33935F5-0CC5-4B8D-976F-84C8CDBCAA8E}\msiexec.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML"
sh=E649E55EAE836B9D6B01233CEBFAFE2339873959 ft=1 fh=8337c2d698a9173e vn="Win32/Agent.WFF trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\ChromeUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML"
sh=6733165E3BC0F8D347AC3D5479731C6A9B50D8A8 ft=1 fh=58a1d71e670dc158 vn="Win32/TrojanDownloader.Cerabit.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\gxujio.dll"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML"
sh=5B3F1A28C3684FAB8F687B8F9C7B4FB25885D48E ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT"
sh=33B7BF12D018C068655C8D9997013C8EA41BFDFF ft=1 fh=95e42e2d289f6aba vn="a variant of Win32/Kryptik.COQS trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Viarorhy\ulcyive.exe"
sh=5448F2694CC2734B59BF552D880995BF39F14E7B ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML"
sh=3650E00121F99F9899EAE3F85CC9925724A57040 ft=1 fh=0f11960c4468971c vn="Win32/TrojanDownloader.Wauchos.A trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Local Settings\Temp\msfbwf.cmd"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT"
sh=F1C8C86B266B41EBE660991BE80E02503311B660 ft=1 fh=6140c315876ca764 vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\CyberLink\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT"
sh=54CC272F4ADCEFA1C78EE21DD700D0B3924D9C41 ft=1 fh=e3d6dad680165ebc vn="Win32/TrojanDownloader.Tracur.AM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\visi_coupon\Rsugiwopzzep.dll"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT"
sh=BCA1A1B3ECE4DA83BCDE5497CA7F97F0DD2E77AF ft=1 fh=b4841c56cc775b08 vn="Win64/Agent.CM trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT"
sh=8FD10B37D749007B9550C9DF0DE702731F902B1B ft=1 fh=c06948dac8bdbf78 vn="a variant of Win64/Agent.CO trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\FrameworkUpdate7\GoogleUpdate.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT"
sh=6080FA6F897D609503008FCB5AB28C4435876E5A ft=1 fh=a0b2106930b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Igqewoti\ygqely.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT"
sh=6A233118AA8F52D1F2FDA4D7373301B5D3FE1C97 ft=1 fh=028fa9e630b2f651 vn="a variant of Win32/Kryptik.CPAL trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Rumowuo\fyysira.exe"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT"
sh=05599ADAA068ADD0AF5F592197E183D47744FBC4 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML"
sh=E4D2C8386F492587BD06996D253897E7CF708E75 ft=0 fh=0000000000000000 vn="Win32/Filecoder.CR trojan" ac=I fn="C:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT"
sh=9C9E9C9F878011680FC76798FD95C43E5EC55785 ft=1 fh=e1712e256b9d55fa vn="a variant of Win32/TrojanProxy.Agent.NYP trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\ivijios.dll"
sh=EA72EA0B157A660AA62927F88B2C8B6F274AD6CD ft=1 fh=ddc67596b5b5a45c vn="Win32/Delf.OEH trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\svcxdcl32.exe"
sh=B6B85DDE35A91A62A76148B7F0E1DF290F151B9B ft=1 fh=466c90e004d3723a vn="a variant of Win32/Kryptik.CPLM trojan" ac=I fn="C:\_OTL\MovedFiles\11062014_181400\C_Users\Judy\AppData\Local\Temp\DHCPprxy.exe"


  • 0

#49
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

Uggh...still less that impressed with the success of ESET in dealing with these files. So, I'm writing a Custom Script for OTL and let's see how that works. Hopefully my wild card file spec works properly.

 

51a5d669693dd-icon_OTL.png Fix with OTL

Please re-run OTL with this removal script included.


 

icon_exclaim.gif This fix was created for this user for use on that particular machine. icon_exclaim.gif
icon_exclaim.gif Running it on another one may cause damage and render the system unstable. icon_exclaim.gif

  • Right-click on 51a5d669693dd-icon_OTL.png icon and select RunAsAdmin.jpg Run as Administrator to start the tool.

Under the Custom Scans/Fixes bar in the box paste in the following:

:Commands
[CreateRestorePoint]
 
:OTL
 
:Files
c:\*DECRYPT_INSTRUCTION.HTML* /s /d
c:\*DECRYPT_INSTRUCTION.TXT* /s /d
 
:Commands
[EmptyTemp]
[ResetHosts]
[Reboot]

 

Push Run Fix and wait patiently.

  • If asked to reboot, please allow it to.
  • A notepad window with a logfile will open after this run.

These files will not be moved, but Deleted, so if  log file from OTL is provided, please post it. :)


  • 0

#50
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Okay, here's the OTL log:

 

All processes killed
========== COMMANDS ==========
System Restore Service not available.
========== OTL ==========
========== FILES ==========
c:\_OTL\MovedFiles\11032014_171008\C_ProgramData\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Local\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\Desktop\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\My Documents\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Public\Documents\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.HTML deleted successfully.
c:\_OTL\MovedFiles\11032014_171008\C_Users\Judy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\App Cache\databases\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Data\Artwork Cache\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Amazon Cloud Player\Logs\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Apple Computer\iTunes\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Chrome\User Data\Default\Extensions\bepbmhgboaologfdajaanbcjmnhjmhfn\0.1.1.5023_0\audio\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2\db3\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Google\Picasa2Albums\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Hewlett-Packard\TouchSmart\Media\CLML\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Device Metadata\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Internet Explorer\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Photo Acquisition\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Backup\old\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Mail\Stationery\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft\Windows Media\12.0\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\FreeCell\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Hearts\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Mahjong Titans\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Solitaire\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Local\Microsoft Games\Spider Solitaire\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Adobe\Acrobat\9.0\Search\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\LocalLow\Microsoft\Silverlight\is\kkybi02j.jta\44rqdl1y.eyq\1\s\psld1rq2evnjg2ki2ziatkouhebg2l4klzm3vvurqxwtu41pinaaahda\f\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Adobe\Flash Player\AssetCache\8UHTUACQ\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874243650\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1317874336428\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache1\1337697632394\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874243650\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1317874336428\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Corel\Messages\540232237_807010\EN\MessageCache2\1337697632394\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WebRegLogs\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\HP\WowLogs\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Intuit\Quicken\Log\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Document Building Blocks\1033\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Templates\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Microsoft\Windows Photo Viewer\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\ShopAtHome\ShopAtHomeToolbar\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\judy.judyd\0\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\_OTL\MovedFiles\11042014_173518\C_Users\Judy\AppData\Roaming\Yahoo!\Messenger\judy.judyd\sheslikedat\0\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\fateundiscoveredrealms\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\hiddenobjectgameshow\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\jewelquestsolitaire2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\johndeeredrivegreen\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\liongthelostamulets\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mahjongmedley\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mortimerbecketttimeparadox\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypinewyorkfortune\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\mysterypivegas\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\peggle\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\penguins\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polarbowler\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\polargolfer\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\scrabblehasbro\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\slingodeluxe\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\totemtribe\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\virtualvillagers3\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\wheeloffortune2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\worldofgoo\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\Common\product\zuma\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\de\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\img\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\img\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\fs_wire\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\en-us\img\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\es-es\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\fr\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\it\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\ko-kr\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\htdocs2\zh-cn\swf\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\ProgramData\WildTangent\My HP Game Console\UI\UIConfig2\Common\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\AppData\Local\Microsoft\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\AppData\Roaming\Microsoft\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\2013\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Apr2010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Dec09\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Jan2010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Jun2010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Mar2010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\May2010\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Chats\Sep09\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\My Scans\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\My Scans\2010-06 (Jun)\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Quicken\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Documents\Quicken\BACKUP\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\Amazon MP3\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\Amazon MP3\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\Class\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bon Jovi\Slippery When Wet\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Bruce Springsteen\High Hopes\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Compilations\In Step\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\All You Need Is Live\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Cowboy Mouth\Voodoo Shoppe\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Evanescence\Fallen\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Garth Brooks\The Ultimate Hits [Disc 1]\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\George Strait\It Just Comes Natural\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Paramore\Riot!\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Pearl Jam\Ten\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Shania Twain\Come On Over\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stone Temple Pilots\Thank You\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Stroke 9\Nasty Little Thoughts\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Tim McGraw\Greatest Hits\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Train\My Private Nation\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Trombone Shorty\Backatown (Bonus Track Version)\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Music\iTunes\iTunes Media\Music\Velvet Revolver\Contraband\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\1\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\1\LostFiles1\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\2\LostFiles2\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\3\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\3\LostFiles3\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\4\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\4\LostFiles4\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\5\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-03-08\5\LostFiles5\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-08-17 gift cans\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2010-12-20 december\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2011-03-01 king cake\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2011-06-04 garden\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2011-12-27\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-03-04 sunday\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-04-10 assorted\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-04-24\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-06-18 garden\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-06-18 garden\2012-06-30 garden\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-06-24 new bath\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-07-15 Sunday\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2012-07-18 flower\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-03-05 Disney\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-05-08 shoes\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-07-20 porch\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-07-23 porch\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-09-05 porch\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2013-09-09 Living Rm now\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2014-02-01 assorted\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2014-02-05 yard\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2014-02-14 flower\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2014-04-22 flower\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\2014-09-01 chair\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\backup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Birthdays\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\boudoir\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\boudoir\2010-03-07\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\boudoir\2010-03-07\Judy Edits\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\D&L wedding\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\David\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\David\Attachments_2011_09_29\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Deb's house\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\downloads\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\downloads\backup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Garth\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\house\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\house\backup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\house\Gardner\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\iPod\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Keith Urban\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\My Scans\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\My Scans\2010-08 (Aug)\backup\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\New Orleans\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\New York\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Peeps\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\PJs\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Judy\Pictures\Ray+Maggie wedding\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\X4\DECRYPT_INSTRUCTION.TXT deleted successfully.
c:\Users\Public\Documents\WordPerfect Office\X4\Tutorial Samples\DECRYPT_INSTRUCTION.TXT deleted successfully.
========== COMMANDS ==========
 
[EMPTYTEMP]
 
User: All Users
 
User: Default
->Temp folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
 
User: Default User
->Temp folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
 
User: Judy
->Temp folder emptied: 377092 bytes
->Flash cache emptied: 10723 bytes
 
User: Public
 
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 17485 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 128 bytes
RecycleBin emptied: 0 bytes
 
Total Files Cleaned = 0.00 mb
 
C:\Windows\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
 
OTL by OldTimer - Version 3.2.69.0 log created on 11222014_103150

Files\Folders moved on Reboot...
C:\Users\Judy\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

PendingFileRenameOperations files...

Registry entries deleted on Reboot...


  • 0

#51
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

That looks good :)

 

How the machine working? Anything more we need to do?


  • 0

#52
JudyDB

JudyDB

    Member

  • Topic Starter
  • Member
  • PipPip
  • 33 posts

Yay!  :D

 

The machine is working well, thank you!  But I've got nothing on it now.  My photos are gone, my Family Tree info is gone, my internet favorites are gone.

 

I haven't checked WordPerfect or Quicken since Thursday.

 

Picasa is telling me that I need to update.  Actually the Windows photo file and Family Tree Maker also are telling me I have to update.  When I open Internet Explorer, it is on the MSN home page, but there are no toolbars.  I also don't have the Files, Edit, View, Favorites, Tools, Help links at the top of the window.  It doesn't look like an IE window.

 

How do I get all of this back?  As I had mentioned previously, I do have back-ups of the photos and Family Tree. 

 

Should I restore back-ups?  Should I run the suggested updates?


  • 0

#53
Biscuithd

Biscuithd

    Trusted Helper

  • Malware Removal
  • 2,573 posts

I think the Malware deleted photos and other user files, unfortunately :upset:   Excellent that you have backups!! If you notice, our tools don't delete, our's "move" the bad files to a different and safe location. I only Deleted the files recently after I saw that there was nothing of value in the Moved location.

 

It's the same with IE, FF, etc. So yes, do the updates and feel free to add the components that you are comfortable with.

 

First, let me remove all of my tools so that your computer is completely clean.

 

51a5ce45263de-delfix.png Clean with DelFix
 
Please download DelFix by Xplode and save it to your desktop.
 
  • Right-click on 51a5ce45263de-delfix.png icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Ensure that Remove disinfection tools, Purge system restore and Reset system settings are checked.
  • Push Run.
  • When finished, it will display a notepad report.
  •  
    Include it for my review

    • 0

    #54
    JudyDB

    JudyDB

      Member

    • Topic Starter
    • Member
    • PipPip
    • 33 posts

    Here's the report.  It didn't remove the ESET or OTL, but everything else is gone from my desktop.

     

    What's next?

     

    # DelFix v10.8 - Logfile created 24/11/2014 at 17:23:51
    # Updated 29/07/2014 by Xplode
    # Username : Judy - JUDY-PC
    # Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)

    ~ Removing disinfection tools ...

    Deleted : C:\_OTL
    Deleted : C:\FRST
    Deleted : C:\zoek_backup
    Deleted : C:\AdwCleaner
    Deleted : C:\Users\Judy\Desktop\mbar
    Deleted : C:\zoek-results.log
    Deleted : C:\Users\Judy\Desktop\AdwCleaner - Shortcut.lnk
    Deleted : C:\Users\Judy\Desktop\JRT.txt
    Deleted : C:\Users\Judy\Downloads\Addition.txt
    Deleted : C:\Users\Judy\Downloads\Extras.Txt
    Deleted : C:\Users\Judy\Downloads\Fixlog.txt
    Deleted : C:\Users\Judy\Downloads\FRST.txt
    Deleted : C:\Users\Judy\Downloads\FRST64.exe
    Deleted : C:\Users\Judy\Downloads\OTL.Txt
    Deleted : C:\Users\Judy\Downloads\OTL.exe
    Deleted : HKLM\SOFTWARE\OldTimer Tools
    Deleted : HKLM\SOFTWARE\AdwCleaner

    ~ Cleaning system restore ...

    Deleted : RP #2842 [Windows Update | 11/10/2014 04:01:55]
    Deleted : RP #2843 [zoek.exe restore point | 11/11/2014 02:13:25]
    Deleted : RP #2844 [Windows Update | 11/11/2014 04:16:44]
    Deleted : RP #2845 [Windows Update | 11/12/2014 03:27:30]
    Deleted : RP #2846 [Malwarebytes Anti-Rootkit Restore Point | 11/13/2014 02:01:30]
    Deleted : RP #2847 [Windows Update | 11/13/2014 04:12:39]
    Deleted : RP #2848 [Windows Update | 11/14/2014 03:41:59]
    Deleted : RP #2849 [Windows Update | 11/14/2014 16:31:34]
    Deleted : RP #2850 [Windows Update | 11/15/2014 03:59:23]
    Deleted : RP #2851 [Windows Update | 11/16/2014 04:02:26]
    Deleted : RP #2852 [Windows Update | 11/16/2014 18:50:53]
    Deleted : RP #2853 [Windows Update | 11/17/2014 03:27:20]
    Deleted : RP #2854 [Windows Update | 11/17/2014 11:33:23]
    Deleted : RP #2855 [Windows Update | 11/18/2014 09:00:12]
    Deleted : RP #2856 [Windows Update | 11/18/2014 22:50:01]
    Deleted : RP #2857 [Windows Update | 11/19/2014 03:56:48]
    Deleted : RP #2858 [Windows Update | 11/20/2014 09:00:12]
    Deleted : RP #2859 [Windows Update | 11/21/2014 04:23:50]
    Deleted : RP #2860 [Windows Update | 11/22/2014 04:42:15]
    Deleted : RP #2862 [Windows Update | 11/23/2014 04:23:24]
    Deleted : RP #2863 [Windows Update | 11/24/2014 02:55:58]

    New restore point created !

    ~ Resetting system settings ... OK

    ########## - EOF - ##########


    • 0

    #55
    Biscuithd

    Biscuithd

      Trusted Helper

    • Malware Removal
    • 2,573 posts

    Delfix is getting wierd in its old age :rofl:   However, we can deal with OTL in this way. Start OTL up and chose Clean Up. OTL will then look for a myriad of things it knows about and will clean them all up and (hopefully) Clean Up itself too :)

     

    With ESET, maybe hang on to that for "on demand" use. It's a pretty good tool. :thumbsup:

     

    Since we're getting close the end here, I wanted to post some Preventive Measures for you to consider as well.

     

    Make sure to come back and let me know how all this works and if you have any questions.

     
    Cryptolocker prevention
    Cryptolocker is a new ransomware that heavily encrypts your important files. At the moment there are no programs that can decrypt these files. You can read how to protect against it here.
     

     

    Preventing Re-Infection

    An ounce of prevention is better than a pound of cure, so, I have listed some tips for you to stay safe on the internet in the future.

    WARNING!: Java is the #1 exploited program at this time. The Department of Homeland Security recommends that computer users disable Java. Have a look at this article.
     

    I would recommend that you completely uninstall Java unless you need it to run an important software. In that instance I would recommend that you disable Java in your browsers until you need it for that software and then enable it. (See How to diasble Java in your web browser and How to unplug Java from the browser)

    If you still want to keep Java

    • Click the Start button
    • Click Control Panel
    • Double Click Java - Looks like a coffee cup. You may have to switch to Classical View on the upper left of the Control Panel to see it.
    • Click the Update tab
    • Click Update Now
    • Allow any updates to be downloaded and installed
    • Warning!: Make sure to uncheck Optional offer box when downloading Java or you will install an adware on your computer.

    Adobe products have to always be updated, because they also are being used to infect your computer.

    • If you want to update Adobe Flash Player, visit this site.
    • If you want to update Adobe Reader, visit this site.
    • Warning!: Make sure to uncheck Optional offer box when downloading Adobe products or you will install an adware on your computer.

    Turning on Automatic Updates is a crucial security measure. Keeping them out-of-date is like begging to get your system infected.

    • Click Start > Control Panel > System and Security > Windows Update
    • Under Windows Update click Turn automatic updating on or off
    • Make sure that your settings are set so that you will receive updates automatically and click OK.

    FileHippo is one of programs that can check for out-of-date programs on your computer. You can get it here

    Recommendations for security programs

    • Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is totally free but for real-time protection you will have to pay a small one-time fee.
    • WinPatrol as a robust security monitor, will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes a snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.

    For some good tips about how to prevent infection in the future, visit this site.
     


    • 0

    Advertisements


    #56
    JudyDB

    JudyDB

      Member

    • Topic Starter
    • Member
    • PipPip
    • 33 posts

    Aha!  Now that we're winding this project down the comedian shows up!

     

    Seems that OTL played a trick on me.  When I opened it, the message was that the link had been moved or deleted.  The program was gone, but the icon was not, so I gave it permission to delete it.

     

    I will spend some time over the long weekend (yay!) reading through the links you've sent, there is much to digest there (a little Thanksgiving humor, a very little).  I must also work on restoring things I've lost, not the least of which is my IE screen.  I tried to download 11 and got the message that I already have a newer version, but I haven't figured out how to get the toolbars and such back.  I did discover that my favorites are still present and I loaded them to the bar, but when I closed and came back later they were not there.  So I'll work on all of that fun and probably cuss a lot.

     

    I'll get back to you with a progress update in a couple of days.  Enjoy your weekend however you may celebrate it!


    • 0

    #57
    Biscuithd

    Biscuithd

      Trusted Helper

    • Malware Removal
    • 2,573 posts

    How are things going with the computer? :)


    • 0

    #58
    JudyDB

    JudyDB

      Member

    • Topic Starter
    • Member
    • PipPip
    • 33 posts

    HI!  Sorry, I meant to update you today, but December gets busy for us, and today began that cycle.  The boss caught up a lot of stuff that I have been waiting on, and today was my turn to finish some things.

     

    I downloaded malwarebytes and ran a scan (got rid of five suspect files), have updated Adobe, verified that Windows updates are set to automatic.  I could not find Java on the machine, so it must have been removed sometime in the fix process.  I solved my Picasa and toolbar problems, and my restored photos are still in the Pictures file.  I meant to back-up Family Tree from the work computer today, but in the busy-ness I forgot, so I haven't worked on that yet, and I can't seem to find that data file on the home computer.  I've read some of the copious links you sent.  All in all, things seem to be working at top form, so thank you.

     

    Is there anything else we need to do?


    • 0

    #59
    Biscuithd

    Biscuithd

      Trusted Helper

    • Malware Removal
    • 2,573 posts

    All in all, things seem to be working at top form.

    Great! :) That's what I like to hear :thumbsup:

     

     

    You are quite welcome! It's been a pleasure!! :)

     

     

    Is there anything else we need to do?

     

    I don't think there's anything else that needs to be done. I'll keep this topic open for a few days in case you have questions or need anything. If something pop's up and the topic is closed, just PM me or any Admin and they will re-open it and notify me.


    • 0

    #60
    JudyDB

    JudyDB

      Member

    • Topic Starter
    • Member
    • PipPip
    • 33 posts

    Thank you so much.  I especially appreciate your patience.  As I mentioned, I don't know much about the inner workings of a computer, but I know enough to follow directions and to navigate around programs to discover the best ways to use them.

     

    I will continue restoring my personal items, and I think it will all be good, but I appreciate that you will hold the topic open for a few more days.

     

    What I feared could be a harrowing process turned out to be reassuring and much easier to work through.

     

    Thank you again.


    • 0






    Similar Topics


    Also tagged with one or more of these keywords: dllhost.exe*32, chrome*32, decrypt instruction

    0 user(s) are reading this topic

    0 members, 0 guests, 0 anonymous users

    As Featured On:

    Microsoft Yahoo BBC MSN PC Magazine Washington Post HP