|| Stealth Keyboard Interceptor
|| - Alias: ProcKill-AA trojan, Trojan.Win32.Killav.aa
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||process: powexch.exe: MD5 Hash: c2b586782d0c603a9b5...
process: qlaunch.exe: MD5 Hash: f713b84a6946ffb6355...
process: skin2000.exe: MD5 Hash: 53f384f852a9ba6a7a5...
process: skin2000.exe: MD5 Hash: fb4d891b6e8a0fbedf2..
||Key Logger - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.