I-Spy 1.5 Surveillance Information
|| I-Spy 1.5
Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.
||This program is a Keylogger/Desktop Picture Capture that runs in the background hidden from view
All the keystrokes are stored in a "timestamped".log file ,the Desktop picture are timestamped when they are captured,The program can be auto-started,Desktop Capture time rate can be changed,this program will also not show up in the CRL-ALT-DELETE" programs list.
||process: Help.exe: MD5 Hash: 490efa5b52a1bde2f40..
||Surveillance - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.
Top Surveillance Visited Pages:
Screen Spy1.1 - 496 visits
PC Pandora - 111 visits
Ardamax Keylogger Lite 1.2 - 111 visits
Child Control - 95 visits
All-In-One Spy 2.0 - 94 visits
PCAnywhere PassView v1.11 - 93 visits
e-Surveiller 1.6 - 83 visits
Salus - 81 visits
Srv.SSA-KeyLogger - Alias: W32/Dumaru - 77 visits
Give Me Too v2.30 - 77 visits
Random Surveillance Pages:
All-In-One Spy 2.0
123 PC Spy
Email Spy Pro v4.5
Net Monitor for Employees 2.2.2
PAL Computer Surveillance