Main Menu
Contact Us

Watchful Eye Key Logger Information

Name: Watchful Eye
Category: Key Logger
Alias: - Alias: Amecisco Invisible KeyLogger Stealth
Advice: Remove
Risk: Severe Risk Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
Description: This program records all keystrokes typed, Web sites visited, screen snapshots, and programs run. It can report via e-mail, network copy and remote viewing.

Signatures: process: we.exe: MD5 Hash: 166701d241565fb57c7... process: _761c2dfc.exe: MD5 Hash: 372db06066172706668..
Type: Key Logger - A Trojan software is any software on a user's computer that the user is not aware or intentionally installed. Most Trojan software is designed to perform some sort of actions that could jeopardize the user's security or privacy.

Top Key Logger Visited Pages:
Keyboard Thief - 3451 visits
Stealth Keyboard Interceptor - 2567 visits
Stealth Keyboard Interceptor 5.0 - 2094 visits
Keyboard Spectator Lite 1.3 - 1969 visits
Phantom of the Keyboard II - 1819 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1435 visits
FKWP 2.0 - 456 visits
HackPass - 425 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
SysMono.dr - Alias: SysMono, Trojan.Win32.SysMono
ProBot Activity Monitor
System Spy - Alias: Trojan.Spy.VB.s, System Spy 1.00
WinEggDrop Online Keylogger - Alias: TrojanSpy.Win32.WinEggDrop.11, Win32.Mooder.f
SRDL - Alias: TrojanSpy.Win32.Srdl.14, W32/NGVCK
Hook Dump - Alias: Trojan.win16.Hookdump.a
Tong Key Logger - Alias: Tong Key Logger 1.0
KeyLog GhostSpy - Alias: KeyHook.dll, Trojan.Win32.Ghostspy
Invisible KeyLogger Stealth - Alias: Amecisco Invisible KeyLogger Stealth


2006-2008 - Privacy Policy