2. Perfect Keylogger : Default installation in folder C: Program FilesBPK ; The executable file is named bpk.com ; Contains a dangerous trojan named PS.Banker.25.S located in the file named Inst.bin . When installed, this keylogger will try to put this trojan in the folder ' Temp ', located very deep in the ' Documents and Settings ' folder . This trojan records e-financial transaction passwords online to send to its owner. When the PS.Banker.25.S trojan is infected with the 'death' antivirus program, this keylogger tool is no longer working.
The user interface of Perfect Keylogger
3. Spy Recon : Follow other songs:
The 'righteous' keyloggers
The keyloggers ' publish ' in the default directory are C: Program FilesSpy Recon - Platinum ; The executable file is named svrsrn.exe ; Contains files that record the operation of the device as TXT in the ' Logs ' folder located in the installation directory; This keylogger contains a trojan called Trojan.Spy.Spyrecon.A hidden in cbt.dll file that can send all stolen information to an e-mail as well as send information directly to Its owner.
4. XPCSpy Pro : Default setting in the folder C: Program FilesXsoftware ; The executable file is called XPCSpyPro.exe ; Contains the screen capture file as a XSM file in the ' Screenshots ' folder located in the installation folder. This form of XSM file is actually JPG but this keylogger has been disguised as XSM; Note that keyboard operation in TXT file format and contained in the folder named ' Report ' is also located in the installation directory. This keylogger launches into a trojan computer called Trojan.Spy.Delf.DU , hidden in a file named systemout.exe and located in the WindowsSystem32 directory; Being able to send the recorded results to a certain e-mail address, and secretly send a copy to the author designed the trojan.
5. Fingerprints : the default installation directory is C: Fingerprints ; Once installed, Fingerprints will immediately launch a Trojan named Trojan.Spy.Agent.JF hidden in keyhooi.dll file into the Windows system32 directory; This keylogger will save its keyboard activity log file as a FLF file in the installation directory that can be viewed with NotePad; When the computer is networked, the trojan will secretly send the resulting FLF files to its owner.
HOANG HAI