Stealth KeySpy

Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

General information:

Malware Name: Stealth KeySpy
Malware Type: Key Logger
Company Name: Professional Global Marketing
Company URL: http://professionalglobalmarketing.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

Professional Global Marketing provides you the software Stealth KeySpy that is a powerful utility that secretly captures anything the user types on the keyboard or URLs visited. User is completely unaware of its presence. Special hotkey and login is necessary to open the program. Users cannot terminate the program. Users cannot uninstall the program.

Spyware Description:

Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

Characteristics/Symptoms:

    -> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.

Additional information might be found here:

google Search at Google for Stealth KeySpy
bing Search at Bing for Stealth KeySpy
yahoo Search at Yahoo for Stealth KeySpy

Processes Running:

Stealth KeySpy.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\[USER]\Desktop\Stealth KeySpy 2.0.lnk 592 Shortcut
C:\WINDOWS\system32\SKS\Stealth KeySpy.exe 390656 Application
C:\WINDOWS\system32\SKS\english.lng 4519 LNG File

Folder information Created after Installation:

Folder Location

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name