Employee Monitoring Key Logger Information
|| Employee Monitoring
|| - Alias: KeyLog-Impossible, Trojan.Spy.Wsnd
High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
||Employee Monitoring the most powerful PC surveillance utility.
It Records web based email including AOL, Hotmail, Yahoo! and others,Records all file attachments and downloads,records all emails including pop3 (usernames and passwords),records chat and IM with complete logs (usernames and passwords) ,detecting watchwords and notifications,stealth mode and password protection features are also included.
||process: WinPcap_3_0_nogui.exe: MD5 Hash: 29c54557ca7c76d1060...
process: EMTrialsetup.exe: MD5 Hash: ...
process: EMTrialsetup.exe: MD5 Hash: a17e6d37ef290af6865...
process: EMTrialsetup.exe: MD5 Hash: a17e6d37ef290af6865..
||Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.
Top Key Logger Visited Pages:
Keyboard Thief - 3398 visits
Stealth Keyboard Interceptor - 2519 visits
Stealth Keyboard Interceptor 5.0 - 2046 visits
Keyboard Spectator Lite 1.3 - 1921 visits
Phantom of the Keyboard II - 1771 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1396 visits
FKWP 2.0 - 447 visits
HackPass - 415 visits
Global Hook - 231 visits
winsniffer v1.22 - 142 visits
Random Key Logger Pages:
Raven - Alias: FobiaSoft Raven
ProBot Activity Monitor
YSK KeyLog - Alias: Keylog-Pino, Trojan.Spy.Pino.11, YSK KeyLog 1.0
Online Logger - Alias: Trojan.Spy.Excon
Impossible Key Logger - Alias: KeyLog-Impossible, Trojan.Spy.Wsnd