Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Tro.Apwiz.AA is a program used to capture sensitive information.
On an infected machine, Tro.Apwiz.AA will capture login information normally for predefined financial websites. Tro.Apwiz.AA may also be used to steal other sensitive information.
||process: svchst.exe: MD5 Hash: 0524260ec947e8cdf3c...
process: gfcafldg.exe: MD5 Hash: 2b635b70de8a80c60ea...
process: explorer.exe: MD5 Hash: 4a680273902360231a5..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.