Backdoor.Sesent
Backdoor.Sesent is a hazardous Trojan infection which can enter a targeted computer by exploiting vulnerabilities via Adobe documents. If executed, Backdoor.Sesent will allow a remote attacker to access and monitor affected PC system by creating a backdoor port. When Backdoor.Sesent is dropped and installed, a bunch of fake security alerts and warning messages will be displayed on the screen claiming that the PC system is seriously infected. Backdoor.Sesent is able to corrupt your system files and change web browser settings. Remove Backdoor.Sesent immediately once you detect it on your machine otherwise, it can lead to serious damage to your PC.
File System Details
Backdoor.Sesent may create the following file(s):
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | %System%\dllcache\pit70ux.sys | |
2. | %Windir%\Installer\bc87ee.msi | |
3. | %System%\esent64.exe | |
4. | %Windir%\Installer\b28892x.msi | |
5. | %Temp%\lsass.exe | |
6. | %System%\dllcache\aic982x.sys | |
7. | %System%\wmvds32.exe | |
8. | %Temp%\svchost.exe | |
9. | %UserProfile%\Cookies\index64.dat |
Registry Details
Backdoor.Sesent may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8ADE92E4-D32E-0B4B-F53F-6C7E3677DFB3}\"StubPath" = "[THREAT FILE NAME]"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Secdrv\"ImagePath" = "system32\369877.tmp"
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\RunOnce\"IgfxTray" = "[THREAT FILE NAME]"
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.