Solved

saint desktop application

Posted on 2011-03-08
5
1,003 Views
Last Modified: 2013-12-13
I found an application that was installed on my computer, but I can't see it under control panel add-remove programs. The name of the application is SAINT desktop application Lt
I have google it, but I can't get more information. I am wondering if it is a tracking or something cause if I go to the Program Files\SAINT desktop application LT  There are 3 files
host-list.bin
phrase-list.bin
word-list.bin

My OS is Windows 7

It seems very suspicios. Anyone know which application is this ?
Thanx in advance
0
Comment
Question by:crescue
  • 3
5 Comments
 
LVL 38

Expert Comment

by:younghv
Comment Utility
I've never heard of it, but it is showing up here in a Google Search:
http://systemexplorer.net/db/saint-fs.exe.html
0
 
LVL 38

Expert Comment

by:younghv
Comment Utility
I would submit the executable to:
http://virusscan.jotti.org/en

Can you right-click on any of the files/folders and see who the "Owner" of any of them are?

Are there any processes/services running named something associated?
0
 
LVL 38

Accepted Solution

by:
younghv earned 500 total points
Comment Utility
Found the parent site:
http://www.saintapp.com/

Looks as though someone installed it.
What is your computer environment - home or office.
Could have been your IT staff at work, or someone else at home.
0
 
LVL 32

Expert Comment

by:aleghart
Comment Utility
0
 

Author Closing Comment

by:crescue
Comment Utility
Thanx My friend took it to a computer repair place, and they installed it.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This video demonstrates how to use each tool, their shortcuts, where and when to use them, and how to use the keyboard to improve workflow.
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now