|| Pearl Echo
||Commercial Remote Control
Low risk threats pose a very low risk or no immediate danger to your computer or your privacy, however these types of applications may profile user online habits, but only according to specific privacy policies stated in the applications End-User License. These types of threats generally borderline on being a threat to being a standard application that has a complex license agreement that you knowingly installed.
||Pearl Echo® is an enterprise-class employee Internet monitoring, filtering and control software program designed to monitor and control the Internet activity of multiple PCs and thin clients from a central location.
||process: setup.exe: MD5 Hash: 9d06ad3ddcd50cf553b...
process: srnappp6.exe: MD5 Hash: dda2d2ac06a02fb3235...
process: rnappp6.exe: MD5 Hash: 3a4970f670d0f8a94dc...
process: setup.exe: MD5 Hash: 731606d64294aa1cfad..
||Commercial Remote Control - Yourself or your administrator for the purpose of managing a computer remotely installs a Commercial Remote Control Tool unlike a Commercial RAT or a Trojan RAT. In addition, a Commercial Remote Control application is installed with the user's knowledge and does not have the ability to install as a stealth application.