Main Menu
Home
Bookmark
Contact Us



 
Delf Key Logger Information

Name: Delf
Category: Key Logger
Alias: - Alias: BackDoor-AGK, Backdoor.ZSpy
Advice: Remove
Risk: Elevated Risk Elevated threats are usually threats that fall into the range of adware in which data about a user's habits are tracked and sent back to a server for analysis without your consent or knowledge.
Description:

Signatures: process: xpl01t3r'z keyboard spy.exe: MD5 Hash: 595aab6183ee987ba0d... process: xpl01t3r'z keyboard spy.exe: MD5 Hash: aa59ea445c6a066b626... process: creator.exe: MD5 Hash: ea972eb9db87cd099ea... process: server.exe: MD5 Hash: 0c0436c174079ae4a73... process: editor.exe: MD5 Hash: 126ccae4d3ec535b265... process: server.exe: MD5 Hash: 9396978c743087d1fe7... process: qeyes.exe: MD5 Hash: 709844b85f0e20eb6f4... process: msns(www.portalmes.com).exe: MD5 Hash: b151ed089e7a0bd3c8e... process: services.exe: MD5 Hash: 9dfb42c537d8a455b60... process: services.exe: MD5 Hash: 5005dc97870631357dd... process: turbo tax key code.exe: MD5 Hash: a36cf103e8e94ca0999... process: hotmail hacker.exe: MD5 Hash: bec1b82bb10fdd37349... process: snt.exe: MD5 Hash: 25f4465bad4f198e0f9... process: mirc.exe: MD5 Hash: c2a9ee7b7f7e5e200db... process: services.exe: MD5 Hash: 534e383fd0fbe60d6ec... process: ntolesvc32.exe: MD5 Hash: 42eee4719e658431bc2... process: turbo_tax_key_code.exe: MD5 Hash: c9b9ecd53a3f3aa3606... process: rundll~.exe: MD5 Hash: b4ce239460e90508f99... process: cmd32.exe: MD5 Hash: f379d02f378591cefd8... process: copy of games (1).exe: MD5 Hash: d3fd8448f70323b79dd... process: dxreg.exe: MD5 Hash: f3aa53c43df8528fab0... process: criticalupdate.exe: MD5 Hash: 77d5b37977ced8b8358... process: hotmail hacker.exe: MD5 Hash: 219fddbae104dd1432f... process: syschost.exe: MD5 Hash: 39a8a3e191e55c721d4... process: osa.exe: MD5 Hash: 0ba634386a9d7f68462... process: svcnut32.exe: MD5 Hash: a9c8addb5155b09782c... process: sepcqaaa.exe: MD5 Hash: 4AE4888BCEA9B41B85B..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.



Top Key Logger Visited Pages:
Keyboard Thief - 3423 visits
Stealth Keyboard Interceptor - 2541 visits
Stealth Keyboard Interceptor 5.0 - 2068 visits
Keyboard Spectator Lite 1.3 - 1943 visits
Phantom of the Keyboard II - 1793 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1417 visits
FKWP 2.0 - 453 visits
HackPass - 422 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
Personal Antispy - Alias: Keylog-Perfect, KeyLogger.Win32.PerfectKeyLogger.147
Hook Dump - Alias: Trojan.win16.Hookdump.a
JanNet Remote Keylogger - Alias: Trojan.Spy.Janet.30, Trojan.Spy.Janet.420
Better Email Enable Everything - Alias: BEEE
Pass Stealer - Alias: Trojan.Spy.VB.j
Stealth Email Redirector
Keyhook
Watchful Eye
Pesonal Inspector
ZSpy II 0.99b - Alias: BackDoor-AGK, Backdoor.ZSpy


 


2006-2008 spyware32.com - Privacy Policy