Busted Surveillance Information
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Busted is a keylogger which records keystrokes of the user's PC.
Features: records silently whenever the computer is running, log files can be copied to a remote location at specified intervals, records all AOL conversations, records all web sites visited by the user, records all applications used on the computer, take
||process: Busted.exe: MD5 Hash: 266b8f5a0b5edeb7025...
process: Closer.exe: MD5 Hash: 0b5654ad7e46a4e0487...
process: SentinelListener.exe: MD5 Hash: 3ccba6c1802e28f1514..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.
Top Surveillance Visited Pages:
Screen Spy1.1 - 494 visits
PC Pandora - 111 visits
Ardamax Keylogger Lite 1.2 - 111 visits
Child Control - 95 visits
All-In-One Spy 2.0 - 94 visits
PCAnywhere PassView v1.11 - 93 visits
e-Surveiller 1.6 - 83 visits
Salus - 81 visits
Srv.SSA-KeyLogger - Alias: W32/Dumaru - 77 visits
Give Me Too v2.30 - 77 visits
Random Surveillance Pages:
PAL Computer Surveillance
PCAnywhere PassView v1.11
Axife Mouse Recorder
Activity Monitor version 3.8
Srv.SSA-KeyLogger - Alias: W32/Dumaru