Keyboard.spectator Spyware

Keyboard.spectator virus description
Technical details:
Categories: Spyware

Keyboard.spectator indications of infection

This symptoms of Keyboard.spectator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ALV Trojan Information
Removing Pigeon.ESS Trojan
Bancos.IEL Trojan Cleaner

TrojanDropper.Win32.VB.bg Trojan

This summary is not available. Please click here to view the post.

Half.Life.Server.Heroin.Injector Backdoor

Half.Life.Server.Heroin.Injector virus description
Technical details:
Categories: Backdoor,DoS
Half.Life.Server.Heroin.Injector Aliases:
[Kaspersky]Backdoor.VB.dt;
[McAfee]Generic BackDoor.b trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/VB;
[Computer Associates]Backdoor/VB.dt

Half.Life.Server.Heroin.Injector indications of infection

This symptoms of Half.Life.Server.Heroin.Injector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CIL Trojan Cleaner

Lolkilla Trojan

Lolkilla virus description
Technical details:
Categories: Trojan,Hacker Tool
Lolkilla Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Lolkilla!Trojan

Lolkilla indications of infection

This symptoms of Lolkilla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Diout Trojan
Silencer Trojan Information
Bat.Sys Trojan Information

Pigeon.ADT Trojan

Pigeon.ADT virus description
Technical details:
Categories: Trojan

Pigeon.ADT indications of infection

This symptoms of Pigeon.ADT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AVGS Trojan
Remove Backdoor/Worm/Sdbot Worm
Removing TotalVelocity.zSearch BHO

VB.dn Trojan

VB.dn virus description
Technical details:
Categories: Trojan

VB.dn indications of infection

This symptoms of VB.dn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HotBar Adware Symptoms

Drifting Trojan

Drifting virus description
Technical details:
Categories: Trojan

Drifting indications of infection

This symptoms of Drifting detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Poppy Trojan Information
Remove Win32.MS03 Trojan

IERedirector Ransomware

IERedirector virus description
Technical details:
Categories: Ransomware
IERedirector Aliases:
[Kaspersky]Trojan-Clicker.Win32.Small.cf;
[McAfee]Generic AdClicker.d;
[F-Prot]W32/Trojan.AGIZ;
[Other]TrojanClicker:Win32/Small!922B,TROJ_SMALL.GTE,Troj/Small-ERW,Trojan-Clicker.Win32.Small.cf

IERedirector Files:
[%APPDATA%]\.rdr.ini
[%SYSTEM%]\dnsersnd.dll
[%APPDATA%]\.rdr.ini
[%SYSTEM%]\dnsersnd.dll

IERedirector Registry Keys:
HKEY_CLASSES_ROOT\appid\ieredir.dll
HKEY_CLASSES_ROOT\appid\{90a52f08-64ac-4dc6-9d7d-4516670275d3}
HKEY_CLASSES_ROOT\CLSID\{C68AE9C0-0909-4DDC-B661-C1AFB9F5AE53}
HKEY_CLASSES_ROOT\ieredirector.ieredir
HKEY_CLASSES_ROOT\ieredirector.ieredir.1
HKEY_CLASSES_ROOT\typelib\{90a52f08-64ac-4dc6-9d7d-4516670275d3}
HKEY_LOCAL_MACHINE\software\ieredirector
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C68AE9C0-0909-4DDC-B661-C1AFB9F5AE53}
HKEY_CLASSES_ROOT\clsid\{c68ae9c0-0909-4ddc-b661-c1afb9f5ae53}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c68ae9c0-0909-4ddc-b661-c1afb9f5ae53}


IERedirector indications of infection

This symptoms of IERedirector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove FDoS.BloodLust Trojan
revsci.net Tracking Cookie Symptoms
PWS.Logg Trojan Symptoms

Vasilich Trojan

Vasilich virus description
Technical details:
Categories: Trojan
Vasilich Aliases:
[Panda]Trj/Vasil;
[Computer Associates]Vasilich.4048!Trojan

Vasilich indications of infection

This symptoms of Vasilich detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Small.nu Trojan Cleaner
IIS.Snaki Trojan Removal
Removing webcertain.com Tracking Cookie
Remove QD021211 RAT
Winbudget Adware Symptoms

System32 Trojan

System32 virus description
Technical details:
Categories: Trojan
System32 Aliases:
[Panda]Trj/Wini;
[Computer Associates]System32.21446

System32 indications of infection

This symptoms of System32 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cewbnoq Trojan Symptoms
GB Downloader Cleaner
Taz Trojan Information

QMU Trojan

QMU virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
QMU Aliases:
[Kaspersky]MJ.1513.a;
[Computer Associates]QQ 1513

QMU indications of infection

This symptoms of QMU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
power.spy Spyware Symptoms
Owned.FTP Backdoor Removal instruction
Swizzor.Generic Trojan Cleaner
KeyKap Trojan Information

Lemmings Trojan

Lemmings virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Lemmings Aliases:
[Kaspersky]Lemming.2151;
[Panda]Keeper Lemming

Lemmings indications of infection

This symptoms of Lemmings detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.FWY Trojan
AOL.Steal Trojan Information

VCL.Enun Trojan

VCL.Enun virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
VCL.Enun Aliases:
[Kaspersky]PS-MPC-based,VCL-based;
[McAfee]Univ/r;
[F-Prot]VCL.719.A - Dropper;
[Panda]Univ;
[Computer Associates]VCL,VCL.476

VCL.Enun indications of infection

This symptoms of VCL.Enun detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
primawebtools.de Tracking Cookie Removal instruction
888Bar Toolbar Removal
Clit1.sextracker.Tracking.Cookie Tracking Cookie Removal

BackDoor.ABB Backdoor

BackDoor.ABB virus description
Technical details:
Categories: Backdoor
BackDoor.ABB Aliases:
[McAfee]BackDoor-ABB;
[Panda]Backdoor Program,Bck/Helios.26;
[Computer Associates]Backdoor/Helios.24!Server,Backdoor/HotAmp.A

BackDoor.ABB indications of infection

This symptoms of BackDoor.ABB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ASB Trojan Removal instruction
Pigeon.AVQF Trojan Removal
Remove IRC.Predator Backdoor
SillyDl.BCX Trojan Cleaner
Removing Dichas Trojan

Select Trojan

Select virus description
Technical details:
Categories: Trojan
Select Aliases:
[Other]Trojan.Proxy.995

Select indications of infection

This symptoms of Select detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Death.24!Editor Backdoor
W95.CIH Trojan Symptoms
Removing Bancos.GGD Trojan
Bancos.GZZ Trojan Removal
Pigeon.AVPF Trojan Information

Glupzy Trojan

Glupzy virus description
Technical details:
Categories: Trojan
Glupzy Aliases:
[Kaspersky]Trojan.Win32.Disabler,Trojan.Win32.Disabler.i;
[McAfee]Backdoor-DIY;
[Other]Win32/Glupzy,Backdoor.Glupzy,Win32/Glupzy.A

Glupzy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Glupzy indications of infection

This symptoms of Glupzy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CUT Downloader Cleaner
Enculator Backdoor Symptoms

SillyDl.DAX Trojan

SillyDl.DAX virus description
Technical details:
Categories: Trojan

SillyDl.DAX indications of infection

This symptoms of SillyDl.DAX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Suicide Trojan Removal instruction
Pigeon.EMT Trojan Symptoms
Small.ja Downloader Information
MultiDropper.cfg Trojan Cleaner

Crucifix Trojan

Crucifix virus description
Technical details:
Categories: Trojan
Crucifix Aliases:
[Kaspersky]Crucifixion.2914,Crucifixion.2916,Virus.DOS.Crucifixion.2916;
[Eset]Crucifix.2914.Dropper virus;
[Panda]Crucifix.2916;
[Computer Associates]Crucifix.2916

Crucifix indications of infection

This symptoms of Crucifix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ehg.yakpak.hitbox Tracking Cookie Information
TrojanDropper.Win32.FakeExe Trojan Information

Darksma Trojan

Darksma virus description
Technical details:
Categories: Trojan,Downloader
Darksma Aliases:
[Kaspersky]Trojan-Downloader.Win32.ConHook.aa,Trojan-Downloader.Win32.Agent.anm,Trojan-Downloader.Win32.ConHook.ab,Trojan.Win32.BHO.g,Trojan-Spy.Win32.VBStat.e,Packed.Win32.Klone.k,Trojan.Win32.Agent.agv,Trojan-Dropper.Win32.Agent.bdm,Trojan.Win32.BHO.o,Trojan-Downloader.Win32.ConHook.an,Trojan-Downloader.Win32.ConHook.ah,Trojan-Downloader.Win32.ConHook.bd,Trojan-Spy.Win32.VBStat.h,Trojan.Win32.BHO.bd,AdWare.Win32.Virtumonde.ke,Trojan.Win32.BHO.df,Trojan.Win32.BHO.re,Trojan.Win32.BHO.rd,Trojan.Win32.BHO.rg,AdWare.Win32.Virtumonde.agh,Trojan.Win32.BHO.om,AdWare.Win32.Virtumonde.acp,Trojan.Win32.BHO.oi,Trojan.Win32.BHO.xe,Trojan.Win32.BHO.yi;
[McAfee]Downloader-AWX,Spyware-JuanSearch,New Malware.aj,Generic Spy,Vundo;
[F-Prot]W32/Trojan.WDQ,W32/Trojan.TJZ,W32/Trojan2.HRC;
[Other]TROJ_CONHOOK.AH,Win32/Darksma.B,Win32/Darksma.D,Win32/Darksma.K,W32/VBTroj.DAD,Troj/Counto-Gen,Win32/Darksma.J,Infostealer,W32/Darksma.W,Win32/Darksma.AE,Trojan.Metajuan,W32/VBTroj.DCT,Win32/Darksma.AF,Win32/Darksma.P,Trojan.Vundo,Win32/Darksma.Q,Trojan.Win32.BHO.g,Win32/Darksma.S,Trojan Horse,Trojan.Agent.DM,Troj_Agent.PRX,Win32/Darksma.AO,Win32/Darksma.AM,Win32/Darksma.AL,Win32/Darksma.AH,VirTool:Win32/Obfuscator.C,Win32/Darksma.AP,VirTool.Win32/Obfuscator.C,Win32/Darksma.AI,Troj/ConHook-AC,Win32/Darksma.AQ,Trojan.Duntek,Trojan-Spy.Win32.VBStat.h,Win32/Darksma.BJ,Win32/Darksma.BK,Win32/Darksma.EH,Win32/Darksma.FB,Win32/Darksma.FI,Mal/Generic-A,Win32/Darksma.FX,Win32/Darksma.FW,Vundo.gen49,Win32/Darksma.FY,Win32/Darksma.GB,Win32/Darksma.FZ,Win32/Darksma.GA,Trojan:Win32/Vundo.K,Troj/Virtum-Gen,Win32/Darksma.GD,W32/BHO.ALU,Win32/Darksma.GF,Win32/Darksma.HB,Trojan:Win32/Fanop,Win32/Darksma.HK,Trojan:Win32/Vundo.gen!A

Darksma Files:
[%INTERNET_CACHE%]\Content.IE5\09AFSXA7\ms_s_2[1]
[%INTERNET_CACHE%]\content.ie5\7EXSXPVX\ms_s_2[1]
[%INTERNET_CACHE%]\Content.IE5\NI2QBUZD\drf1175715836[1].htm.exe
[%INTERNET_CACHE%]\Content.IE5\TZWBFB2F\drf1176165403[1].htm.exe
[%PROFILE_TEMP%]\aegwmcsd.dll
[%PROFILE_TEMP%]\AOYKQUQV.0LL
[%PROFILE_TEMP%]\CKWDGTRS.0LL
[%PROFILE_TEMP%]\EEBCSFMT.0LL
[%PROFILE_TEMP%]\hmfgaljq.dll
[%PROFILE_TEMP%]\IMCFOKGB.0LL
[%PROFILE_TEMP%]\irarokhf.dll
[%PROFILE_TEMP%]\LNENKGPH.0LL
[%PROFILE_TEMP%]\ofktirtu.dll
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\tmp12.tmp.exe
[%PROFILE_TEMP%]\tmp18B.tmp.exe
[%PROFILE_TEMP%]\tmp1C1.tmp.exe
[%PROFILE_TEMP%]\tmp21.tmp.exe
[%PROFILE_TEMP%]\tmp230.tmp.exe
[%PROFILE_TEMP%]\tmp23C.tmp.exe
[%PROFILE_TEMP%]\tmp23E.tmp.exe
[%PROFILE_TEMP%]\tmp2B.tmp.exe
[%PROFILE_TEMP%]\tmp3C.tmp.exe
[%PROFILE_TEMP%]\tmp3E1.tmp.exe
[%PROFILE_TEMP%]\tmp3E7.tmp.exe
[%PROFILE_TEMP%]\tmp3EF.tmp.exe
[%PROFILE_TEMP%]\tmp4.tmp.dll
[%PROFILE_TEMP%]\tmp4.tmp.exe
[%PROFILE_TEMP%]\tmp5.tmp.exe
[%PROFILE_TEMP%]\tmp55.tmp.exe
[%PROFILE_TEMP%]\tmp58.tmp.exe
[%PROFILE_TEMP%]\tmp87.tmp.exe
[%PROFILE_TEMP%]\tmpA.tmp.exe
[%PROFILE_TEMP%]\tmpAF.tmp.exe
[%PROFILE_TEMP%]\tmpB.tmp.exe
[%PROFILE_TEMP%]\tmpCA.tmp.exe
[%PROFILE_TEMP%]\YPJDRDXF.0LL
[%SYSTEM%]\drmrss.dll
[%SYSTEM%]\dswnit.dll
[%SYSTEM%]\fltmon.dll
[%SYSTEM%]\icaahal.dll
[%SYSTEM%]\icaam32.dll
[%SYSTEM%]\igfPAT.dll
[%SYSTEM%]\kbdock.dll.ren
[%SYSTEM%]\mqsvxx.dll
[%SYSTEM%]\mswiew.dll
[%SYSTEM%]\ssqpn.exe
[%SYSTEM%]\tmp1.tmp.dll
[%SYSTEM%]\tmp10C.tmp.dll
[%SYSTEM%]\tmp11.tmp.dll
[%SYSTEM%]\tmp119.tmp.dll
[%SYSTEM%]\tmp12.tmp.dll
[%SYSTEM%]\tmp142.tmp.dll
[%SYSTEM%]\tmp143.tmp.dll
[%SYSTEM%]\tmp16.tmp.dll
[%SYSTEM%]\tmp167.tmp.dll
[%SYSTEM%]\tmp17.tmp.dll
[%SYSTEM%]\tmp18B.tmp.dll
[%SYSTEM%]\tmp19.tmp.dll
[%SYSTEM%]\tmp1AB.tmp.dll
[%SYSTEM%]\tmp1B9.tmp.dll
[%SYSTEM%]\tmp1C.tmp.dll
[%SYSTEM%]\tmp1D.tmp.dll
[%SYSTEM%]\tmp2.tmp.dll
[%SYSTEM%]\tmp230.tmp.dll
[%SYSTEM%]\tmp23E.tmp.dll
[%SYSTEM%]\tmp296.tmp.dll
[%SYSTEM%]\tmp2B.tmp.dll
[%SYSTEM%]\tmp34.tmp.dll
[%SYSTEM%]\tmp38.tmp.dll
[%SYSTEM%]\tmp3C.tmp.dll
[%SYSTEM%]\tmp3E1.tmp.dll
[%SYSTEM%]\tmp3E7.tmp.dll
[%SYSTEM%]\tmp3EF.tmp.dll
[%SYSTEM%]\tmp4.tmp.dll
[%SYSTEM%]\tmp42.tmp.dll
[%SYSTEM%]\tmp44.tmp.dll
[%SYSTEM%]\tmp4B.tmp.dll
[%SYSTEM%]\tmp5.tmp.dll
[%SYSTEM%]\tmp54.tmp.dll
[%SYSTEM%]\tmp55.tmp.dll
[%SYSTEM%]\tmp59.tmp.dll
[%SYSTEM%]\tmp5E.tmp.dll
[%SYSTEM%]\tmp61.tmp.dll
[%SYSTEM%]\tmp65.tmp.dll
[%SYSTEM%]\tmp68.tmp.dll
[%SYSTEM%]\tmp7.tmp.dll
[%SYSTEM%]\tmp83.tmp.dll
[%SYSTEM%]\tmp87.tmp.dll
[%SYSTEM%]\tmp9.tmp.dll
[%SYSTEM%]\tmp95.tmp.dll
[%SYSTEM%]\tmp9C0.tmp.dll
[%SYSTEM%]\tmpA.tmp.dll
[%SYSTEM%]\tmpA2.tmp.dll
[%SYSTEM%]\tmpAF.tmp.dll
[%SYSTEM%]\tmpB.tmp.dll
[%SYSTEM%]\tmpCA.tmp.dll
[%SYSTEM%]\tmpD.tmp.dll
[%SYSTEM%]\tmpD6.tmp.dll
[%SYSTEM%]\tmpD8.tmp.dll
[%SYSTEM%]\tmpDC.tmp.dll
[%SYSTEM%]\tmpF.tmp.dll
[%SYSTEM%]\tmpFF.tmp.dll
[%SYSTEM%]\WgaTKED.dll
[%SYSTEM%]\wnstssv.exe
[%SYSTEM%]\__c001E9B5.dat
[%DESKTOP%]\tmp12.tmp.exe
[%SYSTEM%]\daxsnp.dll
[%SYSTEM%]\tmp1B2.tmp.dll
[%INTERNET_CACHE%]\Content.IE5\09AFSXA7\ms_s_2[1]
[%INTERNET_CACHE%]\content.ie5\7EXSXPVX\ms_s_2[1]
[%INTERNET_CACHE%]\Content.IE5\NI2QBUZD\drf1175715836[1].htm.exe
[%INTERNET_CACHE%]\Content.IE5\TZWBFB2F\drf1176165403[1].htm.exe
[%PROFILE_TEMP%]\aegwmcsd.dll
[%PROFILE_TEMP%]\AOYKQUQV.0LL
[%PROFILE_TEMP%]\CKWDGTRS.0LL
[%PROFILE_TEMP%]\EEBCSFMT.0LL
[%PROFILE_TEMP%]\hmfgaljq.dll
[%PROFILE_TEMP%]\IMCFOKGB.0LL
[%PROFILE_TEMP%]\irarokhf.dll
[%PROFILE_TEMP%]\LNENKGPH.0LL
[%PROFILE_TEMP%]\ofktirtu.dll
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\tmp12.tmp.exe
[%PROFILE_TEMP%]\tmp18B.tmp.exe
[%PROFILE_TEMP%]\tmp1C1.tmp.exe
[%PROFILE_TEMP%]\tmp21.tmp.exe
[%PROFILE_TEMP%]\tmp230.tmp.exe
[%PROFILE_TEMP%]\tmp23C.tmp.exe
[%PROFILE_TEMP%]\tmp23E.tmp.exe
[%PROFILE_TEMP%]\tmp2B.tmp.exe
[%PROFILE_TEMP%]\tmp3C.tmp.exe
[%PROFILE_TEMP%]\tmp3E1.tmp.exe
[%PROFILE_TEMP%]\tmp3E7.tmp.exe
[%PROFILE_TEMP%]\tmp3EF.tmp.exe
[%PROFILE_TEMP%]\tmp4.tmp.dll
[%PROFILE_TEMP%]\tmp4.tmp.exe
[%PROFILE_TEMP%]\tmp5.tmp.exe
[%PROFILE_TEMP%]\tmp55.tmp.exe
[%PROFILE_TEMP%]\tmp58.tmp.exe
[%PROFILE_TEMP%]\tmp87.tmp.exe
[%PROFILE_TEMP%]\tmpA.tmp.exe
[%PROFILE_TEMP%]\tmpAF.tmp.exe
[%PROFILE_TEMP%]\tmpB.tmp.exe
[%PROFILE_TEMP%]\tmpCA.tmp.exe
[%PROFILE_TEMP%]\YPJDRDXF.0LL
[%SYSTEM%]\drmrss.dll
[%SYSTEM%]\dswnit.dll
[%SYSTEM%]\fltmon.dll
[%SYSTEM%]\icaahal.dll
[%SYSTEM%]\icaam32.dll
[%SYSTEM%]\igfPAT.dll
[%SYSTEM%]\kbdock.dll.ren
[%SYSTEM%]\mqsvxx.dll
[%SYSTEM%]\mswiew.dll
[%SYSTEM%]\ssqpn.exe
[%SYSTEM%]\tmp1.tmp.dll
[%SYSTEM%]\tmp10C.tmp.dll
[%SYSTEM%]\tmp11.tmp.dll
[%SYSTEM%]\tmp119.tmp.dll
[%SYSTEM%]\tmp12.tmp.dll
[%SYSTEM%]\tmp142.tmp.dll
[%SYSTEM%]\tmp143.tmp.dll
[%SYSTEM%]\tmp16.tmp.dll
[%SYSTEM%]\tmp167.tmp.dll
[%SYSTEM%]\tmp17.tmp.dll
[%SYSTEM%]\tmp18B.tmp.dll
[%SYSTEM%]\tmp19.tmp.dll
[%SYSTEM%]\tmp1AB.tmp.dll
[%SYSTEM%]\tmp1B9.tmp.dll
[%SYSTEM%]\tmp1C.tmp.dll
[%SYSTEM%]\tmp1D.tmp.dll
[%SYSTEM%]\tmp2.tmp.dll
[%SYSTEM%]\tmp230.tmp.dll
[%SYSTEM%]\tmp23E.tmp.dll
[%SYSTEM%]\tmp296.tmp.dll
[%SYSTEM%]\tmp2B.tmp.dll
[%SYSTEM%]\tmp34.tmp.dll
[%SYSTEM%]\tmp38.tmp.dll
[%SYSTEM%]\tmp3C.tmp.dll
[%SYSTEM%]\tmp3E1.tmp.dll
[%SYSTEM%]\tmp3E7.tmp.dll
[%SYSTEM%]\tmp3EF.tmp.dll
[%SYSTEM%]\tmp4.tmp.dll
[%SYSTEM%]\tmp42.tmp.dll
[%SYSTEM%]\tmp44.tmp.dll
[%SYSTEM%]\tmp4B.tmp.dll
[%SYSTEM%]\tmp5.tmp.dll
[%SYSTEM%]\tmp54.tmp.dll
[%SYSTEM%]\tmp55.tmp.dll
[%SYSTEM%]\tmp59.tmp.dll
[%SYSTEM%]\tmp5E.tmp.dll
[%SYSTEM%]\tmp61.tmp.dll
[%SYSTEM%]\tmp65.tmp.dll
[%SYSTEM%]\tmp68.tmp.dll
[%SYSTEM%]\tmp7.tmp.dll
[%SYSTEM%]\tmp83.tmp.dll
[%SYSTEM%]\tmp87.tmp.dll
[%SYSTEM%]\tmp9.tmp.dll
[%SYSTEM%]\tmp95.tmp.dll
[%SYSTEM%]\tmp9C0.tmp.dll
[%SYSTEM%]\tmpA.tmp.dll
[%SYSTEM%]\tmpA2.tmp.dll
[%SYSTEM%]\tmpAF.tmp.dll
[%SYSTEM%]\tmpB.tmp.dll
[%SYSTEM%]\tmpCA.tmp.dll
[%SYSTEM%]\tmpD.tmp.dll
[%SYSTEM%]\tmpD6.tmp.dll
[%SYSTEM%]\tmpD8.tmp.dll
[%SYSTEM%]\tmpDC.tmp.dll
[%SYSTEM%]\tmpF.tmp.dll
[%SYSTEM%]\tmpFF.tmp.dll
[%SYSTEM%]\WgaTKED.dll
[%SYSTEM%]\wnstssv.exe
[%SYSTEM%]\__c001E9B5.dat
[%DESKTOP%]\tmp12.tmp.exe
[%SYSTEM%]\daxsnp.dll
[%SYSTEM%]\tmp1B2.tmp.dll

Darksma Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{4E86A50B-A7FF-4cae-B8B7-28A13B6D46F0}
HKEY_CLASSES_ROOT\CLSID\{57E218E6-5A80-4f0c-AB25-83598F25D7E9}
HKEY_CLASSES_ROOT\CLSID\{67C55A8D-E808-4caa-9EA7-F77102DE0BB6}
HKEY_CLASSES_ROOT\clsid\{8a06a1a7-9e64-4359-8556-b6ea03d69814}
HKEY_CLASSES_ROOT\CLSID\{E03C740E-BB24-4d3c-B92A-6F84DE1DD99C}
HKEY_CURRENT_USER\software\microsoft\dinf
HKEY_LOCAL_MACHINE\software\microsoft\dfc
HKEY_LOCAL_MACHINE\software\microsoft\dinf
HKEY_LOCAL_MACHINE\software\microsoft\dnident
HKEY_LOCAL_MACHINE\software\microsoft\dstr5
HKEY_LOCAL_MACHINE\software\microsoft\rasap2k
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\\{67c55a8d-e808-4caa-9ea7-f77102de0bb6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\\{e03c740e-bb24-4d3c-b92a-6f84de1dd99c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4E86A50B-A7FF-4cae-B8B7-28A13B6D46F0}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{57E218E6-5A80-4f0c-AB25-83598F25D7E9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8a06a1a7-9e64-4359-8556-b6ea03d69814}
HKEY_CLASSES_ROOT\clsid\{10b2e556-744a-40e0-a38f-f501262475be}
HKEY_CLASSES_ROOT\clsid\{1f6581d5-aa53-4b73-a6f9-41420c6b61f1}
HKEY_CLASSES_ROOT\clsid\{4a1e9c5d-55c0-4a57-8868-4a92777bb94e}
HKEY_CLASSES_ROOT\clsid\{4e86a50b-a7ff-4cae-b8b7-28a13b6d46f0}
HKEY_CLASSES_ROOT\clsid\{57e218e6-5a80-4f0c-ab25-83598f25d7e9}
HKEY_CLASSES_ROOT\clsid\{67c55a8d-e808-4caa-9ea7-f77102de0bb6}
HKEY_CLASSES_ROOT\clsid\{6b58f8b9-a209-4b30-a177-d91a7a6e28e6}
HKEY_CLASSES_ROOT\clsid\{797811be-79b2-4909-860a-ac7972b10c83}
HKEY_CLASSES_ROOT\clsid\{816bdd15-b149-4667-b942-1d33f7df7f21}
HKEY_CLASSES_ROOT\clsid\{bad2b22b-a3c3-421c-b591-6703037084e4}
HKEY_CLASSES_ROOT\clsid\{c6039e6c-bde9-4de5-bb40-768caa584fdc}
HKEY_CLASSES_ROOT\clsid\{d38439ec-4a75-42b4-90c2-d810d7778fdd}
HKEY_CLASSES_ROOT\clsid\{e03c740e-bb24-4d3c-b92a-6f84de1dd99c}
HKEY_LOCAL_MACHINE\software\microsoft\jn_tr_0a56a554
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\daxsnp
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{10b2e556-744a-40e0-a38f-f501262475be}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1f6581d5-aa53-4b73-a6f9-41420c6b61f1}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4a1e9c5d-55c0-4a57-8868-4a92777bb94e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4e86a50b-a7ff-4cae-b8b7-28a13b6d46f0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{57e218e6-5a80-4f0c-ab25-83598f25d7e9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{6b58f8b9-a209-4b30-a177-d91a7a6e28e6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{797811be-79b2-4909-860a-ac7972b10c83}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{816bdd15-b149-4667-b942-1d33f7df7f21}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{bad2b22b-a3c3-421c-b591-6703037084e4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c6039e6c-bde9-4de5-bb40-768caa584fdc}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d38439ec-4a75-42b4-90c2-d810d7778fdd}


Darksma indications of infection

This symptoms of Darksma detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Golden.Retriever Trojan Information
PPRich Adware Symptoms
Vxidl.AUY Trojan Symptoms

Devsog Downloader

Devsog virus description
Technical details:
Categories: Downloader

Devsog indications of infection

This symptoms of Devsog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Stardialer Adware
Removing CO Trojan
Removing Vxidl.AJL Trojan
Multino Trojan Information
Removing intelli.direct.com Tracking Cookie

Packed.Polycrypt Trojan

Packed.Polycrypt virus description
Technical details:
Categories: Trojan

Packed.Polycrypt indications of infection

This symptoms of Packed.Polycrypt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spy.mIRC DoS Removal
Remove PSW.Delf.cj Trojan
Freeze.Screensaver Toolbar Cleaner
StripPlayer Adware Symptoms
HLLP.Eter Trojan Information

BasicMath.Process Trojan

BasicMath.Process virus description
Technical details:
Categories: Trojan,Downloader

BasicMath.Process indications of infection

This symptoms of BasicMath.Process detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Trivial Trojan Symptoms

Transmission.Scout Trojan

Transmission.Scout virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Hacker Tool
Transmission.Scout Aliases:
[Kaspersky]Backdoor.TScout.11,Backdoor.TScout.12;
[Eset]Win32/TScout.1_1.Chat trojan,Win32/TScout.1_1.Server trojan,Win32/TScout.1_2.Chat trojan,Win32/TScout.1_2.Server trojan;
[McAfee]BackDoor-CR;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/TScout.1_1,Bck/TScout.1_2;
[Computer Associates]Backdoor/TScout_1.1_Client,Backdoor/TScout_1.1_Server,Win32.TScout.1_1,Backdoor/TScout_1.2_Client,Backdoor/TScout_1.2_Server,Win32.TScout.1_2

Transmission.Scout indications of infection

This symptoms of Transmission.Scout detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AntiSpyStorm Ransomware Symptoms
Remove IllWill.info Spyware

Jiang Trojan

Jiang virus description
Technical details:
Categories: Trojan

Jiang indications of infection

This symptoms of Jiang detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FDoS.IrcNetkill DoS Removal instruction
Remove Orach Trojan

Small.afa Downloader

Small.afa virus description
Technical details:
Categories: Downloader

Small.afa indications of infection

This symptoms of Small.afa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aliseru Trojan Symptoms
Remove Winpage.Blocker BHO
Crash.cmp Trojan Cleaner
Kiso Trojan Cleaner

IdentDaemon Trojan

IdentDaemon virus description
Technical details:
Categories: Trojan,Backdoor
IdentDaemon Aliases:
[Eset]Win32/Ident trojan;
[McAfee]IdentDaemon;
[F-Prot]security risk or a "backdoor" program;
[Computer Associates]Backdoor/Identd.B,Win32.Ident

IdentDaemon indications of infection

This symptoms of IdentDaemon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FavoriteMan.FOne BHO Removal instruction
Sphere Backdoor Removal instruction
Vxidl.ASW Trojan Cleaner
Fate Adware Removal instruction

Small.tt Downloader

Small.tt virus description
Technical details:
Categories: Downloader

Small.tt indications of infection

This symptoms of Small.tt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.GEK Trojan
Ampmess Trojan Symptoms
IstBar.az Downloader Information
MonaBomber RAT Cleaner
PornDialer Trojan Information

SpySheriff Trojan

SpySheriff virus description
Technical details:
Categories: Trojan,Adware,Ransomware

SpySheriff Folders:
[%PROGRAMS%]\SpySheriff
[%PROGRAM_FILES%]\spysheriff
[%PROGRAM_FILES%]\Daily Weather Forecast
[%PROGRAMS%]\spysheriff

SpySheriff Files:
[%APPDATA%]\Install.dat
[%DESKTOP%]\SpySheriff.lnk
[%PROGRAM_FILES%]\PestTrap\base.avd
[%PROGRAM_FILES%]\PestTrap\base001.avd
[%PROGRAM_FILES%]\PestTrap\heur002.dll
[%PROGRAM_FILES%]\SpySheriff\base001.avd
[%SYSTEM%]\service.exe
[%WINDOWS%]\Downloaded Program Files\UWAS6_0001_N69M0903NetInstaller.exe
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAMS%]\SpySheriff\SpySheriff.lnk
[%PROGRAM_FILES%]\SpySheriff\base.avd
[%PROGRAM_FILES%]\SpySheriff\base002.avd
[%PROGRAM_FILES%]\SpySheriff\found.wav
[%PROGRAM_FILES%]\SpySheriff\heur000.dll
[%PROGRAM_FILES%]\SpySheriff\heur001.dll
[%PROGRAM_FILES%]\SpySheriff\heur002.dll
[%PROGRAM_FILES%]\SpySheriff\heur003.dll
[%PROGRAM_FILES%]\SpySheriff\notfound.wav
[%PROGRAM_FILES%]\SpySheriff\removed.wav
[%PROGRAM_FILES%]\SpySheriff\SpySheriff.dvm
[%PROGRAM_FILES%]\SpySheriff\SpySheriff.exe
[%PROGRAM_FILES%]\SpySheriff\Uninstall.exe
[%WINDOWS%]\desktop.html
[%DESKTOP%]\spysheriff.lnk
[%APPDATA%]\Install.dat
[%DESKTOP%]\SpySheriff.lnk
[%PROGRAM_FILES%]\PestTrap\base.avd
[%PROGRAM_FILES%]\PestTrap\base001.avd
[%PROGRAM_FILES%]\PestTrap\heur002.dll
[%PROGRAM_FILES%]\SpySheriff\base001.avd
[%SYSTEM%]\service.exe
[%WINDOWS%]\Downloaded Program Files\UWAS6_0001_N69M0903NetInstaller.exe
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAMS%]\SpySheriff\SpySheriff.lnk
[%PROGRAM_FILES%]\SpySheriff\base.avd
[%PROGRAM_FILES%]\SpySheriff\base002.avd
[%PROGRAM_FILES%]\SpySheriff\found.wav
[%PROGRAM_FILES%]\SpySheriff\heur000.dll
[%PROGRAM_FILES%]\SpySheriff\heur001.dll
[%PROGRAM_FILES%]\SpySheriff\heur002.dll
[%PROGRAM_FILES%]\SpySheriff\heur003.dll
[%PROGRAM_FILES%]\SpySheriff\notfound.wav
[%PROGRAM_FILES%]\SpySheriff\removed.wav
[%PROGRAM_FILES%]\SpySheriff\SpySheriff.dvm
[%PROGRAM_FILES%]\SpySheriff\SpySheriff.exe
[%PROGRAM_FILES%]\SpySheriff\Uninstall.exe
[%WINDOWS%]\desktop.html
[%DESKTOP%]\spysheriff.lnk

SpySheriff Registry Keys:
HKEY_CLASSES_ROOT\clsid\{202b0efd-2cb9-039b-2b11-a3579d6d56a3}
HKEY_CLASSES_ROOT\clsid\{7c43e35c-a398-7c5f-b1ba-7e87073be150}
HKEY_CLASSES_ROOT\clsid\{9cb4ce93-8cc7-9e03-1037-2dd837e3a52e}
HKEY_CURRENT_USER\Software\SNO2
HKEY_CURRENT_USER\SOFTWARE\SpySheriff
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spy sheriff
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\spysheiff
HKEY_CURRENT_USER\software\sno2
HKEY_CURRENT_USER\software\spysheriff
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spysheriff

SpySheriff Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SpySheriff indications of infection

This symptoms of SpySheriff detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Annoy Trojan Removal instruction
Removing HMToolbar Toolbar