||Commercial Remote Control
Low risk threats pose a very low risk or no immediate danger to your computer or your privacy, however these types of applications may profile user online habits, but only according to specific privacy policies stated in the applications End-User License. These types of threats generally borderline on being a threat to being a standard application that has a complex license agreement that you knowingly installed.
||Key logger; captures screens, monitors browsing.
Netobserve creates log files that contain information about various system activities.
||process: broadcast.exe: MD5 Hash: 865d0fe4f453e735a61...
process: netobserve.exe: MD5 Hash: 6e595efd5807308a149...
process: netobserve.exe: MD5 Hash: 26e4538b2c4148efd8b...
process: netobserve.exe: MD5 Hash: a0e20068f69e2f7e203...
process: netobserve.exe: MD5 Hash: ...
process: netobserve-setup-sw.exe: MD5 Hash: 53544d512f5b22291ac...
process: no32mon.exe: MD5 Hash: 5a63665e3610d8b352c..
||Commercial Remote Control - Yourself or your administrator for the purpose of managing a computer remotely installs a Commercial Remote Control Tool unlike a Commercial RAT or a Trojan RAT. In addition, a Commercial Remote Control application is installed with the user's knowledge and does not have the ability to install as a stealth application.