Main Menu
Contact Us

Delf Key Logger Information

Name: Delf
Category: Key Logger
Alias: - Alias: Keylog-Perfect, KeyLogger.Win32.PerfectKeyLogger.147
Advice: Remove
Risk: Elevated Risk Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.

Signatures: process: xpl01t3r'z keyboard spy.exe: MD5 Hash: 595aab6183ee987ba0d... process: xpl01t3r'z keyboard spy.exe: MD5 Hash: aa59ea445c6a066b626... process: creator.exe: MD5 Hash: ea972eb9db87cd099ea... process: server.exe: MD5 Hash: 0c0436c174079ae4a73... process: editor.exe: MD5 Hash: 126ccae4d3ec535b265... process: server.exe: MD5 Hash: 9396978c743087d1fe7... process: qeyes.exe: MD5 Hash: 709844b85f0e20eb6f4... process: msns( MD5 Hash: b151ed089e7a0bd3c8e... process: services.exe: MD5 Hash: 9dfb42c537d8a455b60... process: services.exe: MD5 Hash: 5005dc97870631357dd... process: turbo tax key code.exe: MD5 Hash: a36cf103e8e94ca0999... process: hotmail hacker.exe: MD5 Hash: bec1b82bb10fdd37349... process: snt.exe: MD5 Hash: 25f4465bad4f198e0f9... process: mirc.exe: MD5 Hash: c2a9ee7b7f7e5e200db... process: services.exe: MD5 Hash: 534e383fd0fbe60d6ec... process: ntolesvc32.exe: MD5 Hash: 42eee4719e658431bc2... process: turbo_tax_key_code.exe: MD5 Hash: c9b9ecd53a3f3aa3606... process: rundll~.exe: MD5 Hash: b4ce239460e90508f99... process: cmd32.exe: MD5 Hash: f379d02f378591cefd8... process: copy of games (1).exe: MD5 Hash: d3fd8448f70323b79dd... process: dxreg.exe: MD5 Hash: f3aa53c43df8528fab0... process: criticalupdate.exe: MD5 Hash: 77d5b37977ced8b8358... process: hotmail hacker.exe: MD5 Hash: 219fddbae104dd1432f... process: syschost.exe: MD5 Hash: 39a8a3e191e55c721d4... process: osa.exe: MD5 Hash: 0ba634386a9d7f68462... process: svcnut32.exe: MD5 Hash: a9c8addb5155b09782c... process: sepcqaaa.exe: MD5 Hash: 4AE4888BCEA9B41B85B..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.

Top Key Logger Visited Pages:
Keyboard Thief - 3397 visits
Stealth Keyboard Interceptor - 2519 visits
Stealth Keyboard Interceptor 5.0 - 2046 visits
Keyboard Spectator Lite 1.3 - 1921 visits
Phantom of the Keyboard II - 1771 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1396 visits
FKWP 2.0 - 446 visits
HackPass - 414 visits
Global Hook - 231 visits
winsniffer v1.22 - 142 visits

Random Key Logger Pages:
FKWP 2.0
Power Key Logger
Second Sight
KGB Keylogger
System Spy - Alias: Trojan.Spy.VB.s, System Spy 1.00
Personal Antispy - Alias: Keylog-Perfect, KeyLogger.Win32.PerfectKeyLogger.147


2006-2008 - Privacy Policy