Spector Key Logger Information
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Spector monitors keystrokes, emails, chat conversations, visited web sites and takes snapshots of the current contents of the display.
||process: sp40setup.exe: MD5 Hash: 1390f9b7ef89a831b65...
process: spadmin.exe: MD5 Hash: 371f11d8c2dbf73265d...
process: spector_eval.exe: MD5 Hash: dd7281d23b39145d4e5...
process: spsetup.exe: MD5 Hash: e69909bb8d872cd20c0...
process: webebot.exe: MD5 Hash: a35a65f53b427c22c91...
process: winnetcl.exe: MD5 Hash: 8b2ec48919a252b26c6...
process: winnetcl.exe: MD5 Hash: dbaa11b82d2c2a25677...
process: winnetcl.exe: MD5 Hash: ...
process: wswinntfp.exe: MD5 Hash: ..
||Key Logger - Spyware's primary purpose is to collect demographic and usage information from your computer, usually for advertising purposes. Spyware usually that 'sneaks' onto a system or performs other activities hidden to the user. Spyware programs are usually bundled as a hidden component and downloaded from the Internet. These modules are almost always installed on the system secretively and try to run secretively as well.
Top Key Logger Visited Pages:
Keyboard Thief - 3398 visits
Stealth Keyboard Interceptor - 2519 visits
Stealth Keyboard Interceptor 5.0 - 2046 visits
Keyboard Spectator Lite 1.3 - 1921 visits
Phantom of the Keyboard II - 1771 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1396 visits
FKWP 2.0 - 447 visits
HackPass - 415 visits
Global Hook - 231 visits
winsniffer v1.22 - 142 visits
Random Key Logger Pages:
Lyttlesoft KeyBugger - Alias: Lyttlesoft KeyBugger 1.1.36
KeySave - Alias: KeySpy, Trojan.Spy.KeySave, Trojan.Spy.KeySave
SoftForYou Keylogger 1.0
TheLimit trojan horse keylogger