Main Menu
Contact Us

Remote Keylogger Key Logger Information

Name: Remote Keylogger
Category: Key Logger
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
Description: Remote Keylogger records every keystrok.

It records every keystrok as well as send all those record via e-mail to a remote user.

Signatures: process: UnInstall_1.exe: MD5 Hash: 57c8e4d6dc0912a59a9... process: rkl.exe: MD5 Hash: fa88b229f6122cf2bc7... process: keylogger.exe: MD5 Hash: 2888012b7255f905658... process: keylogger.exe: MD5 Hash: 2888012b7255f905658..
Type: Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.

Top Key Logger Visited Pages:
Keyboard Thief - 3465 visits
Stealth Keyboard Interceptor - 2577 visits
Stealth Keyboard Interceptor 5.0 - 2104 visits
Keyboard Spectator Lite 1.3 - 1979 visits
Phantom of the Keyboard II - 1829 visits
Stealth Keyboard Interceptor Pro - Alias: SKInPro - 1445 visits
FKWP 2.0 - 458 visits
HackPass - 427 visits
Global Hook - 232 visits
winsniffer v1.22 - 143 visits

Random Key Logger Pages:
SKLog - Alias: Keylog-Sklog
Win32. AutoAccepter
Super Stealth Key Capturer - Alias: SSKC
Win32.Redblood.21 - Alias: KeyLog-RedBlood, Trojan.Win32.RedBlood.21
Spy Lantern Keylogger Home v5.0.2
WideStep Quick
SysMono.dr - Alias: SysMono, Trojan.Win32.SysMono
Better Email Enable Everything - Alias: BEEE
SC-KeyLog - Alias: Keylog-SC, Trojan.Spy.SCKeyLog.a


2006-2008 - Privacy Policy