Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Tro.Appwiz.C is a program used to capture sensitive information.
On an infected machine, Tro.Appwiz.C will capture login information normally for predefined financial websites. Tro.Appwiz.C may also be used to steal other sensitive information.
||process: traff.exe: MD5 Hash: 5326badbcb37d523349..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.