Źródło: https://www.fireeye.com/blog/threat-research/2015/05/teslacrypt_followin.html