Stealth KeySpy
Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes,
passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It
works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
General information:
Malware Name: |
Stealth KeySpy |
Malware Type: |
Key Logger |
Company Name: |
Professional Global Marketing |
Company URL: |
http://professionalglobalmarketing.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Professional Global Marketing provides you the software Stealth KeySpy that is a powerful utility that secretly captures anything the user types on the keyboard or URLs visited. User is completely unaware of its presence. Special hotkey and login
is necessary to open the program. Users cannot terminate the program. Users cannot uninstall the program.
Spyware Description:
Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes,
passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Stealth KeySpy is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works
in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
Characteristics/Symptoms:
-> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.
Additional information might be found here:
Processes Running:
Stealth KeySpy.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Desktop\Stealth KeySpy 2.0.lnk |
592 |
Shortcut |
C:\WINDOWS\system32\SKS\Stealth KeySpy.exe |
390656 |
Application |
C:\WINDOWS\system32\SKS\english.lng |
4519 |
LNG File |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |