Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Srv.Spy.Docent is keylogger program used to capture sensitive information on the infected computer.
Srv.Spy.Docent transmits stolen information from the infected machine to a predefined server.
||process: file1.exe: MD5 Hash: 82a733b97104587e52f..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.