Main Menu
Contact Us

looxee Key Logger Information

Name: looxee
Category: Key Logger
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
Description: This Key Logger is designed to record user activity.

This Key Logger is designed to record user activity.
This type of key logger can aslo be invisible to the victim, and monitors every keystrok raise through his keyboards and keep a seperate records of every keystrok in the form of log file.

Signatures: process: LooxeeTrialSetup.exe: MD5 Hash: 41e9368b698165b8360... process: LooxeeTrialSetup.exe: MD5 Hash: 41e9368b698165b8360..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.

Top Key Logger Visited Pages:
Keyboard Thief - 3452 visits
Stealth Keyboard Interceptor - 2568 visits
Stealth Keyboard Interceptor 5.0 - 2095 visits
Keyboard Spectator Lite 1.3 - 1970 visits
Phantom of the Keyboard II - 1820 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1436 visits
FKWP 2.0 - 456 visits
HackPass - 425 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
Win32.MSN.GhostToolz.B - Alias: Trojan.Win32.MSN.GhostToolz.b
Save Keys 6.0 - Gold Edition
Szpieg 1.0
Boss Everyware 2.83
DGSSoftware KeyLogger - Alias: TrojanSpy.Win32.Dgs
Windows Key Analyst 1.4a


2006-2008 - Privacy Policy