Technical details:
Categories: Spyware
SentryPC Folders:
[%APPDATA%]\sacache
[%PROGRAMS%]\sentrypc
[%PROGRAM_FILES%]\sentrypc
SentryPC Files:
[%WINDOWS%]\sbrowse.exe
[%APPDATA%]\tester-acu.dat
[%SYSTEM%]\acopts.dat
[%SYSTEM%]\ntinvisible.dll
[%SYSTEM%]\tester-acopts.dat
[%WINDOWS%]\acsplash.dat
[%WINDOWS%]\acsystem.dll
[%WINDOWS%]\yahoodll.dll
[%WINDOWS%]\sbrowse.exe
[%APPDATA%]\tester-acu.dat
[%SYSTEM%]\acopts.dat
[%SYSTEM%]\ntinvisible.dll
[%SYSTEM%]\tester-acopts.dat
[%WINDOWS%]\acsplash.dat
[%WINDOWS%]\acsystem.dll
[%WINDOWS%]\yahoodll.dll
SentryPC Registry Keys:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\sentrypc
SentryPC Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\sentrypc
SentryPC indications of infection
This symptoms of SentryPC detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Power.Linking.Profits.com BHO Symptoms
No comments:
Post a Comment