Busted Surveillance Information
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Busted is a keylogger which records keystrokes of the user's PC.
Features: records silently whenever the computer is running, log files can be copied to a remote location at specified intervals, records all AOL conversations, records all web sites visited by the user, records all applications used on the computer, take
||process: Busted.exe: MD5 Hash: 266b8f5a0b5edeb7025...
process: Closer.exe: MD5 Hash: 0b5654ad7e46a4e0487...
process: SentinelListener.exe: MD5 Hash: 3ccba6c1802e28f1514..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.
Top Surveillance Visited Pages:
Screen Spy1.1 - 488 visits
PC Pandora - 111 visits
Ardamax Keylogger Lite 1.2 - 111 visits
All-In-One Spy 2.0 - 94 visits
Child Control - 94 visits
PCAnywhere PassView v1.11 - 93 visits
e-Surveiller 1.6 - 83 visits
Salus - 81 visits
Srv.SSA-KeyLogger - Alias: W32/Dumaru - 77 visits
Give Me Too v2.30 - 77 visits
Random Surveillance Pages:
ReJump Time Tracker
Spy Software 4 Parents 8.7
Remote Desktop Spy
Email Spy Pro v4.5