Main Menu
Home
Bookmark
Contact Us



 
Stukach Key Logger Information

Name: Stukach
Category: Key Logger
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
Description: Stukach is a tiny little programm, which can run hiddenly on some computer, keeping track of everything user types on the keyboard, and sending this information to you via e-mail.

Stukach is a tiny little programm, which can run hiddenly on some computer, keeping track of everything user types on the keyboard, and sending this information to you via e-mail. Open this URL, register yourself for this site by filling the form, then only you 'll be able to download anything from this site. It will send a confirmation link in the email specified by you, click on that link to activate your registratiorn. Open "http://www.hacker.com.pl", then at the left side of the page click on "keylogger", then click on category "Q-R-S-T". On the opened page, in the text box "Szukana Fraza" write "Stukach" and then click on "Szukaj" button, it'll open a page with Stukach, then click on "POBIERZ" to download "[[1].www.haker.com.pl]Stukach.zip", unzip this file and run "StukSt.exe" to install this spyware.

Signatures: process: RunMe.exe: MD5 Hash: a09e2037e8015c8a057... process: RunMe.exe: MD5 Hash: a09e2037e8015c8a057... process: StukSt.exe: MD5 Hash: 78852288b10ad51ab72... process: StukSt.exe: MD5 Hash: 78852288b10ad51ab72... process: RunMe.exe: MD5 Hash: da74e3bfb7fe491d01b... process: RunMe.exe: MD5 Hash: da74e3bfb7fe491d01b... process: sysreq.exe: MD5 Hash: da74e3bfb7fe491d01b..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.



Top Key Logger Visited Pages:
Keyboard Thief - 3472 visits
Stealth Keyboard Interceptor - 2582 visits
Stealth Keyboard Interceptor 5.0 - 2109 visits
Keyboard Spectator Lite 1.3 - 1983 visits
Phantom of the Keyboard II - 1834 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1449 visits
FKWP 2.0 - 460 visits
HackPass - 429 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
eNFILTRATOR Black Box
Ehks
Windows Key Analyst 1.4a
JanNet Remote Keylogger - Alias: Trojan.Spy.Janet.30, Trojan.Spy.Janet.420
Win32.Redblood.21 - Alias: KeyLog-RedBlood, Trojan.Win32.RedBlood.21
Personal Antispy - Alias: Keylog-Perfect, KeyLogger.Win32.PerfectKeyLogger.147
Apophis Spy - Alias: Trojan.Spy.Apophis.10
CLogger - Alias: Trojan.Spy.CLogger
KGB Keylogger
ProcAlert


 


2006-2008 spyware32.com - Privacy Policy