Module32 Key Logger Information
|| - Alias: Trojan.Spy.Toxicity
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||Module32 is a keylogger that steals passwords from the infected system.
||process: MODULE32.EXE: MD5 Hash: ..
||Key Logger - Spyware's primary purpose is to collect demographic and usage information from your computer, usually for advertising purposes. Spyware usually that 'sneaks' onto a system or performs other activities hidden to the user. Spyware programs are usually bundled as a hidden component and downloaded from the Internet. These modules are almost always installed on the system secretively and try to run secretively as well.
Top Key Logger Visited Pages:
Keyboard Thief - 3472 visits
Stealth Keyboard Interceptor - 2582 visits
Stealth Keyboard Interceptor 5.0 - 2109 visits
Keyboard Spectator Lite 1.3 - 1983 visits
Phantom of the Keyboard II - 1834 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1449 visits
FKWP 2.0 - 460 visits
HackPass - 429 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits
Random Key Logger Pages:
TeeJayEm KeySpy - Alias: TeeJayEm KeySpy 1.0
PC Police Silver 1.0.0
Sinred Keylogger - Alias: Trojan.Spy.Sinred.10
The Ill-Logger - Alias: Keylog-Ill, Trojan.Spy.ILL
YSK KeyLog - Alias: Keylog-Pino, Trojan.Spy.Pino.11, YSK KeyLog 1.0
Toxicity Remote KeyLog - Alias: Trojan.Spy.Toxicity