Can be easily solved. For that you need somebody who is experienced in Computer Forensics & Reverse Engineering. Use Sandboxing Application...
Separate names with a comma.