|| Desktop Surveillance Personal
||Commercial Key Logger
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||process: flash.exe: MD5 Hash: 99dc867eff689c6a3bf...
process: killproc.exe: MD5 Hash: 13f70253877b500fb57...
process: messagebox.exe: MD5 Hash: 1b9cdd0cf3a3a901765...
process: odspconfig.exe: MD5 Hash: 786ee75acddf57c36bd...
process: odsphost_nt.exe: MD5 Hash: 2dfb6d4e29b2cd71875...
process: odsplay.exe: MD5 Hash: 3cb47ffbcd6f0a5532d..
||Commercial Key Logger - A commercial key logger is a program that is installed by the user of a computer to explicitly monitor the activity of other users. These types of program can be installed using stealth tactics to hide themselves from other users. In addition these programs can be purchased from commercial organizations for this use.