Technical details:
Categories: Ransomware
PestCapture Folders:
[%PROGRAMS%]\Pest-Capture
[%PROGRAMS%]\PestCapture
[%PROGRAM_FILES%]\PestCapture
PestCapture Files:
[%DESKTOP%]\PestCapture.lnk
[%PROFILE%]\start
[%PROGRAM_FILES%]\PestCapture\PestCapture.exe
[%DESKTOP%]\PestCapture.lnk
[%PROFILE%]\start
[%PROGRAM_FILES%]\PestCapture\PestCapture.exe
PestCapture Registry Keys:
HKEY_CURRENT_USER\SOFTWARE\Pest-Capture
HKEY_CURRENT_USER\Software\PestCapture
HKEY_CURRENT_USER\SOFTWARE\PestCaptureSetup
HKEY_CURRENT_USER\Software\PestCapture\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pest-Capture
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PestCapture
PestCapture Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PestCapture indications of infection
This symptoms of PestCapture detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
One.beta RAT Information
Removing Danton Trojan
No comments:
Post a Comment