Main Menu
Contact Us

Invisible KeyLogger Stealth Key Logger Information

Name: Invisible KeyLogger Stealth
Category: Key Logger
Advice: Remove
Risk: Elevated Risk Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.
Description: Invisible KeyLogger Stealth monitors computer activity. It records keystrokes, passwords, email, and documents and adds them to a log file.

Signatures: process: datview.exe: MD5 Hash: 154f4f0a0b4a556b36f... process: datview.exe: MD5 Hash: e4f3dd50df22e2902ad... process: iksinstall.exe: MD5 Hash: cb0aec776d57164bb95... process: datview.exe: MD5 Hash: 78fcf1b50685d22f62c... process: iksinstall.exe: MD5 Hash: 8ba8862cf1dda9bff98... process: datview.exe: MD5 Hash: c08aaa655984e3dc1e4... process: iks2k20d.exe: MD5 Hash: 4111eb5a2a9acb140ee... process: iks.sysdatview.exe: MD5 Hash: ... process: iks.sysdatview.exe: MD5 Hash: ..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.

Top Key Logger Visited Pages:
Keyboard Thief - 3451 visits
Stealth Keyboard Interceptor - 2567 visits
Stealth Keyboard Interceptor 5.0 - 2094 visits
Keyboard Spectator Lite 1.3 - 1969 visits
Phantom of the Keyboard II - 1819 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1435 visits
FKWP 2.0 - 456 visits
HackPass - 425 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
Impossible Key Logger - Alias: KeyLog-Impossible, Trojan.Spy.Wsnd
Raven - Alias: FobiaSoft Raven
WM Remote KeyLogger - Alias: Backdoor.WMRemote
Diablo Keys
Fearless Key Spy - Alias: Fearless Key Spy, Trojan.Spy.Fearless.10, Trojan.Spy.Fearless.11b, TrojanSpy.Win32.Fearless.20
Windows Spy


2006-2008 - Privacy Policy