2c7fba06354f5d6df388c6ea329aff306694c8e9 *$$$_.log a0a2ca58f8ac580c6d6f2d7b303e674e6713c947 *IESecurity.dll bebc39d39e06eccb2937b9b1547562d6f1795846 *Install.dat 75d24b9c7bee65f2b088f58f4e422c744f7eeeba *ProcMon.dll 572b895c49944218fbc8824548961f74bc6eb059 *SSL 6c0bc9a201638d8175275e90f641c34f79bf6307 *SpySheriff.dvm 47d4451e6fc28086f185be2043c2ff3c6b646d11 *SpySheriff.exe 41db33869f899c821f6cf8838364ceda4e108dbe *SpySheriff_1.dat 9948ad61621d3235822d9ed297277ff7e40d801a *SpySheriff_2.dat 7c072ff57e369705cd64801c87c3618951890f53 *Uninstall.exe fb2d8929d9ac72b2ef5f9b5b250f69c33fdb727f *abc.exe 5b86c0f03ece9714f814553eb07b16a728576dcd *appwiz.dll 5a900396fb7da5e82039ae05ecf19173c8367435 *cssrs.exe 17c21ae94a37d83634222e87888a6ce76e8774fd *desktop.html 88bff644c535012d4a0f306f5ab06b8e835086bd *found.wav 11cb2a6106bbbe9022ea42a230d992e8435e592d *hammer.exe ac2fe572acd6f097740621e94e24f5dcfdafc6fc *hijackthis1.log e06bb67c64b3b5cbb1bed3f37406375938c5d7e1 *hijackthis2.log 14057c2805ac294ca8fc38b55045ae4b279f2e5f *hijackthis3.log 0a92c6264a14b89121f75989dbfdc2e23790b37a *hosts d66282bec3858ed3a443d72d02af5ae07ecc4f13 *init32m.exe aac7e94d0c46fc33a9e8ed26f7c5ae98cd233bca *kl.exe 6da27dcf7d3fd026ebdb13eb8e306cd659642c67 *latest.exe 360bc01c9e93d09506e51bad54dff768d28b9daf *loadnew.exe 11cb2a6106bbbe9022ea42a230d992e8435e592d *mdms.exe d66282bec3858ed3a443d72d02af5ae07ecc4f13 *ms1.exe 2d5fe4dc54ea6b985080a15aa03e5fd2fd18ca92 *ms2.exe 32fa5f9c160eb72eb391be0097c5a34e0b61df07 *ms3.exe c555bf170c23e684e77be31d77cd70cff286a395 *ms4.exe 72b29375c68af7f6f439ede25ea08c29927cb90c *network-log-urls.txt ae79952780f616b0224b086383eff5bd8fbec71a *network-log.txt c555bf170c23e684e77be31d77cd70cff286a395 *newdial.exe cfe0832bd5b107c94a54dc3c64df930462955dcf *notfound.wav 5f6cb7c751b714b174a08f33eadbfd6b8fcd695d *paydial.exe 05da98d6308b72483741a5c1037f3d8333150d00 *paytime.exe 4e7d4934041eaa2f7ea83804ba753834a5bbb68e *ps.a3d 8e0d5b0b6741701160eaff298c945ce7a4be6b9c *removed.wav 28386bfafd2b34865b60c9ae3390e94d13de697f *roger@maiden4u[1].txt a4ae44fdc5a1ad581835aa87a0dcd7e4ca4a44c7 *roger@spylog[1].txt 79112dc85fa04e4f7d038f18396a45bdb927cf21 *spanner.exe c7eba6105a02cedf1f8366d142d7abd1fa90c153 *symcsvc.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5430.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5432.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5434.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5544.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5546.exe 0e77588c0738e37b5e41f7a9cca047f16e282eaf *sys5547.exe f70ef89a0f024b7697463f97241dcaa82579c42e *tibs.exe 615421801aa7b9de4f26651d383c50cf9685e012 *tool2.exe 560eb47e95cb6ebb553740011fcf220c3fae03fc *tool3.exe da39a3ee5e6b4b0d3255bfef95601890afd80709 *uniq 5c5d43f8f6cc5685037f62c714ed7a61241cd3f6 *vr_sys.dll 3203ceda02d82b9f0df3a433047c3f061e68201a *winacpi.dll f5e6bda5ad9f69676600d78398bec495d4b83409 *winld32.dll 66ff00d72ed68fa417638b514610c7cf611ddb90 *zlbw.dll c7eba6105a02cedf1f8366d142d7abd1fa90c153 *~update.exe