KGB Spy (unique "keylogger"). Remove KGB Spyware (KGB SPY) Download KGB Spy Removal Tool from Russian company Security Stronghold

Spy KGB Spy allows you to set an invisible mode of operation, so that no one will guess that it is monitored by a real keylogger. KGB Spy discreetly monitors the operation of the computer: records information entered from the keyboard, data from the clipboard, monitors visited sites.

How to detect and remove KGB Spy.

How to protect your personal information with Mask S.W.B from one of the most popular keyloggers - KGB Spy.

How can a computer user who does not have knowledge in the field of information security detect a spy hidden in his system and protect himself from surveillance without removing the keylogger from the computer in order to mislead the one who is following you? And how to remove the spy KGB Spy if you choose to do so? Consider the situation on the example of a common keylogger KGB spy and programs Mask S.W.B, which creates a secure platform for the user.

After launching Mask S.W.B anti-spyware, click the "System Processes" button.


In the system processes window, you can see all running processes, except for hidden ones.

To see if you have programs on your computer that hide themselves, click the Hidden Processes button.


Scroll to the bottom of the Hidden Processes window. All hiding programs (rootkits) will be highlighted in red.


In the picture above, we see a spyware called KGB spy. This keylogger is configured to hide its actions and spy on the user.

If you want to remove Kgb Spy, select "Open application folder" from the context menu.


In the window that opens, run the uninstallation of the program and the spyware will be removed.


If you just want to hide your actions from a keylogger and thereby mislead someone who is following you, then log into the platform by clicking the button with the name of the program, as shown in the figure above.

Inside the protection platform, those programs that hide themselves from the user (rootkits) can simply be seen in the process window.


Program Mask S.W.B creates a safe environment in which you can do everything, but the user's behavior becomes uncontrollable for spyware.


Spies will not be able to see your actions performed in a secure platform, which means that it will not be possible to transfer information about them to their owners either. Mask S.W.B protects against taking video from the monitor screen, from taking screenshots, does not allow receiving data from the keyboard and clipboard. In addition, it hides the sites you have visited and other information about your activities.

If you find a spy that your wife or your husband (well, or the boss at work) has set for you, do not rush to delete it. Think about it: it might be better for them to think that you are not doing anything unknown to them on the computer, since the spy will be clean. And in the meantime you can in the platform Mask S.W.B do what you wish.

In the picture below, we see that the KGB spy, after performing actions in the Mask S.W.B cloaking platform, could not fix anything.


The masking program hides the user's actions from all currently existing spies. With its help, you can detect and destroy computer spies that work at the level of kernel system drivers and are invisible to antivirus programs.

Download the anti-spyware program Mask S.W.B and check if you are being tracked with KGB spy

KGB Spy is a keyboard spy. Working in stealth mode, the program does not show its presence, respectively, the secret of surveillance is stored on high level. Write down the information that was entered from the keyboard, copy the information from the clipboard, track which Internet sites were visited when using a personal computer.

The information that is collected during monitoring will be saved by the application in a database, access to which has only the user who installed it. There is a setting to send a report on user actions by e-mail. The report displays the most detailed information. The product is able to "remember" the screenshots taken. A signal will be sent to the mailbox if one of the users has typed a forbidden word, as well as notifications for other reasons.

Download for free the full Russian version of KGB Spy from the official site without registration and SMS.

System requirements

  • Supported OS: Windows 7, 10, 8.1, 8, Vista, XP
  • Bit depth: 32 bit, x86, 64 bit

Name of the threat

Executable file name:

Threat type:

Affected OS:

kgbspy-393.exe

Spyware/trojan

Win32 (Windows XP, Windows Vista, Windows Seven, Windows 8)



KGB Spy infection method

KGB Spy copies its file(s) to your HDD. Typical file name kgbspy-393.exe. It then creates an autoload key in the registry with the name and value kgbspy-393.exe. You can also find it in the list of processes named kgbspy-393.exe or .

If you have additional questions regarding KGB Spy, please fill in and we will contact you shortly.


Download Removal Tool

Download this program and remove KGB Spy and kgbspy-393.exe (download will start automatically):

* SpyHunter was developed by US company EnigmaSoftware and is able to remove KGB Spy's uninstall automatic mode. The program has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8.

Functions

The program is able to protect files and settings from malicious code.

The program can fix browser problems and protects browser settings.

Removal is guaranteed - if SpyHunter fails, free support is provided.

24/7 anti-virus support is included in the package.


Download KGB Spy Removal Tool from Russian company Security Stronghold

If you are not sure which files to delete, use our program KGB Spy Removal Tool.. KGB Spy Removal Tool will find and completely remove all problems related to KGB Spy virus. Fast, easy-to-use KGB Spy Removal Tool will protect your PC from KGB Spy threat that harms your computer and violates your privacy. KGB Spy Removal Tool scans your hard disks and registry and destroys any manifestation of KGB Spy. Regular anti-virus software is powerless against malicious programs such as KGB Spy. Download this simplified removal tool specially designed to solve problems with KGB Spy and kgbspy-393.exe (download will start automatically):

Functions

Removes all files created by KGB Spy.

Removes all registry entries created by KGB Spy.

The program can fix problems with the browser.

Immunizes the system.

Removal is guaranteed - if the Utility fails, free support is provided.

24/7 anti-virus support via the GoToAssist system is included in the package.

Let our support team solve your KGB Spy problem and remove KGB Spy right now!

Leave detailed description your problem with KGB Spy in the . Our support team will contact you and provide a step-by-step solution for KGB Spy problem. Please describe your problem as precisely as possible. This will help us provide you with the most effective KGB Spy removal method.

How to remove KGB Spy manually

This problem can be solved manually by deleting the registry keys and files associated with KGB Spy, removing it from startup list and de-registering all associated DLLs. In addition, missing DLL files must be restored from the OS distribution if they have been corrupted.

To get rid of you need:

1. End the following processes and delete the corresponding files:

Warning: you need to delete only files whose checksums are in the list of malicious ones. Your system may have the necessary files with the same names. We recommend using for a safe solution to the problem.

2. Delete the following folders:

3. Delete the following registry keys and/or values:

Warning: If registry key values ​​are provided, you must remove only the specified values ​​and leave the keys themselves intact. We recommend using for a safe solution to the problem.

4. Reset browser settings

Sometimes it can affect your browser settings, such as changing search and homepage. We recommend that you use the free "Reset Browsers" feature in "Tools" in the program to reset all browsers at once. Please note that before doing this you need to delete all files, folders and registry keys belonging to KGB Spy. To reset browser settings manually, use this instruction:

For Internet Explorer

    If you are using Windows XP, click Start, and Open. Enter the following in the field Open without quotes and click Enter: "inetcpl.cpl".

    If you are using Windows 7 or Windows Vista, click Start. Enter the following in the field Search without quotes and click Enter: "inetcpl.cpl".

    Select tab Additionally

    Under Reset Internet Explorer browser settings, click Reset. And press Reset again in the window that opens.

    Select checkbox Delete personal settings to delete history, restore search and home page.

    After Internet Explorer has finished resetting, click close in the dialog box.

Warning: Reset browser settings in Tools

For Google Chrome

    Find the Google Chrome installation folder at: C:\Users\"username"\AppData\Local\Google\Chrome\Application\User Data.

    In folder User Data, find the file Default and rename it to Default Backup.

    Launch Google Chrome and a new file will be created Default.

    Google Chrome settings reset

Warning: In case that doesn't work, use the free option. Reset browser settings in Tools in the Spyhunter Remediation Tool.

For Mozilla Firefox

    Open Firefox

    Select from the menu Help > Troubleshooting Information.

    click button Reset Firefox.

    After Firefox finishes, it will show a window and create a folder on the desktop. Click To complete.

Warning: This is how you lose your passwords! We recommend using the free option Reset browser settings in Tools in the Spyhunter Remediation Tool.

USER AND OPERATOR OF THE INFORMATION SYSTEM

When determining the presence or absence of a sanction for actions with information in an information system, it is important to clearly understand the difference between the concepts of “user” (programs or computers) and “operator information system". The concept of "user" is commonly used in many areas of human activity (there are concepts of "property user", "wildlife user", "subsoil user", "work user", "user of communication services", "computer user", etc.) , and the concept of "information system operator" is a special legal one, defined in the law and not requiring interpretation.

Let's try to deal with the user first. Ushakov’s explanatory dictionary of the Russian language says that a user is “a person who has some kind of property in use, in operation”, that is, on the one hand, a user can be understood as a person using a computer. However, in accordance with Art. 1280 of the Civil Code, a user is “a person lawfully owning a copy of a computer program or a copy of a database”, Thus, the word “user” can also be used to define the owner of a copy of a program or database. Which of these two concepts applies to our case? Since illegal access to information and the creation of malicious programs should be considered only in the context of relations with information (and not relations with intellectual property), the conclusion is unambiguous - in our case, it is necessary to be guided by the interpretation of Ushakov's dictionary. Therefore, in the context of Chapter 28 of the Criminal Code, a user is any person who uses a computer.

Now back to the information system operator. According to the definition given in Article 2 of the Federal Law "On Information ...", "an information system operator is a citizen or legal entity engaged in the operation of an information system, including the processing of information contained in its databases." If we limit ourselves to this definition, we can draw the wrong conclusion. that “user” and “information system operator” are one and the same. However, in Part 2 of Art. 13 of the same law states: “unless otherwise provided by federal laws, the operator of the information system is the owner of the technical means used to process the information contained in the databases, who lawfully uses such databases, or the person with whom this owner has concluded an agreement on the operation of the information system ". That is, we are not talking about any user, but either about the owner of computer equipment, or about the person whom the owner hired to manage this equipment. Thus, both, for example, a family member of the owner of a home computer, and an employee of a company working on corporate equipment, being a computer user, is not an information system operator. Therefore, it cannot be said that such a user needs to obtain permission to access information - he simply does not have the rights to give such a sanction. But the owner of a home computer or the director of a company that owns computer technology has such rights, which is clearly stated in the law. Accordingly, if access to information is authorized by the operator of the information system, then whether an ordinary user wants or does not want this access to be carried out, this does not bother anyone - the operator of the information system exercises his legal right.

The main conclusion from the difference described above is this. It is impossible to consider access to information without the authorization of the user, but with the authorization of the operator of the information system (which is implemented at the technical level using the administrator's password) illegal, and the program that implements such access is malicious.

If an ordinary user stores his own information in the information system of the employer (or relative or acquaintance), then he, as its owner, formally has the right to allow or deny access to it. However, as follows from the law and practice, the permission or prohibition of "technical access" to information stored in the information system is controlled by its operator, and the owner of the information does not have the right to interfere in the management of the information system.

The result is the following. If an ordinary user, as the owner of his own information, has an agreement with an information system operator and this agreement provides that the user has the right to store his own information in someone else's information system, and the information system operator undertakes to take measures to protect it from unauthorized actions, then at the end In the end, the sanction for access to information in the information system is still given by its operator (by prior agreement with the owner of the information). If there is no such contract, then by his actions to enter information into someone else's information system, the user actually provides access to it to the operator of the information system, which makes the latter its legal owner. From which, again, it follows that the operator will determine the mode of "technical access" to the information system.

08
dec
2010

KGB Spy 4.2.1.804

Release year: 2009
Genre: Computer monitoring, parental control
Developer: MIPKO
Developer site: http://www.kgbspy.ru/
Interface language: Multilingual (Russian is present)
Platform: Windows XP, Vista, 7
System requirements: Processor: 1GHz, RAM: 256MB
Description: KGB SPY 4.2.1.804 is a salvation for those who want to see what their employee (husband, wife, child,
etc.) is engaged on the computer when you are not around. The program has a number of functions, customizable
under the user. Of which: keystrokes, screenshots, program activity, clipboard,
visited websites, computer activity. There is a two-level password protection.


08
july
2015

Bandicam 2.2.3.804 RePack by KpoJIuK

Release year: 2015
Genre: Taking screenshots, screen capture
Developer: Bandisoft
Developer site: http://www.bandisoft.com/

Assembly type: Repack
Bit depth: 32/64-bit
Operating system: Windows XP, Vista, 7, 8.1, 10
Description: Bandicam allows you to record a specific area on a PC screen, or in a program that uses DirectX / OpenGL graphics technologies. Bandicam can help you record video with a high compression ratio, keeping the quality of the video closer to the original and delivering performance far beyond other...


26
july
2017

The KMPlayer 4.2.1.4 repack by cuta (build 2)

Release year: 2017
Genre: Multimedia player
Developer: by cuta
Developer site: kmplayer.com
Interface language: Multilingual (Russian is present)
Assembly type: Repack
Bit depth: 32/64-bit
Operating system:
Operating system: Windows XP, Vista, 7, 8, 10
System requirements: Disk space: 200 MB
RAM: 256 MB, for SVP 1Gb
Processor: Pentium 4 or higher Video card with support: DirectX 9.0
Description: The KMPlayer is a powerful multimedia player designed to play audio / video files in almost all possible formats. Convince yourself and test it in...


03
july
2012

Galaxy on Fire 2 1.0.4.4 ENG

Release year: 2010
Genre: Arcade
Developer: Fishlabs
Developer site: http://www.fishlabs.net/en/
Interface language: English
Platform: Android
System requirements: Android 2.3. The game runs on all devices with GPU Adreno 200/205(Snapdragon) (platforms Qualcomm QSD8x50, MSM7x27, QSD8x50A, MSM7x30, MSM8x55)
Description: Galaxy on Fire 2 ™ sets new standards for video games and offers a quality and depth of play unparalleled in the science fiction genre. Discover a galaxy of over 20 solar systems and 100 space stations in 3D. Epic, full...


01
oct
2012

LS 2-NDFL ADV-6-2 RSV-1 4-FSS 2.00 dated 09/30/2012

Release year: 2012
Genre: Accounting
Developer: Lugasoft
Developer site: www.lugasoft.ru
Interface language: Russian
Assembly Type: Standard
Bit depth: 32/64-bit
Operating system: Windows XP, Vista, 7
Description: Preparation and formation of information in electronic form according to forms 2-NDFL, ADV-6-4, SZV-6-3, ADV-6-2, SZV-6-1, SZV-6-2, RSV-1 and 4 -FSS. Entering income statements individuals, information of personalized accounting and settlements on accrued and paid insurance premiums, as well as the formation of files for transfer by tax agents and payers of insurance premiums information ...


03
Feb
2010

Release year: 2009
Genre: Disc burning
Developer: Nero AG
Developer site: http://www.nero.com/
Interface language: Multilingual (Russian is present)

Description: Nero 9 is a set software digital media and the world's most trusted next-generation home entertainment center. It features cutting-edge functionality that makes enjoying digital media so easy. This easy-to-use yet powerful multimedia suite gives you the freedom to create, read, copy, burn, edit...


21
aug
2012

Native Instruments - Kontakt 4.2.3 + Update 4.2.4 RePack

Release year: 2011
Genre: Sampler
Developer: Native Instruments GmbH.
Developer site: http://www.native-instruments.com
Interface language: English
Assembly type: Repack
Bit depth: 32/64-bit

System requirements: Intel Core Duo or AMD Athlon 64, 2 GB RAM
Description: Native Instruments Kontakt 4.2.3 is a new version the legendary professional sampler, which has been considered for many years the most ideal solution for the production of high-end musical products from Native Instruments. It is under this sampler that music is produced ...


19
May
2011

HTC Home 2 2.4.223.1 Portable

Release year: 2011
Genre: Widgets
Developer: Stealth
Developer site: http://www.htchome.org
Interface language: Russian
Build Type: Portable
Bit depth: 32/64-bit
Operating system: Windows Vista, 7
System requirements: Internet connection (possibly through a proxy server) Installed by Microsoft. NET Framework 4
Description: HTC Home 2 - clock widget, weather forecast and realistic animation.
Add. Information: Quick access HTC Home 2 uses the capabilities of the Windows 7 taskbar - displaying the current weather in the taskbar without going to the program window. To find out the temp...


11
Feb
2013

Overloud - Breverb 2 2.1.4 RePack

Release year: 2013
Genre: Reverb
Developer: Overloud
Developer site: Overloud
Interface language: English
Build type: RePack by R2R
Bit depth: 32/64-bit
Format: VST, RTAS
Operating system: Windows 2000, XP, 2003, Vista, 2008, 7
System requirements: VST Supporting Host application.
Description : Overloud - Breverb 2 is a high-quality software reverb modeled after well-known hardware devices. It includes seven different reverb algorithms - Hall, Room, Plate, Inverse, Spaces small, Spaces large and Sources, all of which are accurately modeled and played...


07
Jan
2010

Genre: Speech Synthesis
Developer: Shoitov-Kharitanovsky
Developer site: http://www.mp3book2005.ru/
Interface language: Russian
Platform: Windows XP, Vista, 7
Description: Many computer users do not even suspect that the computer can speak, and the quality of the synthesized computer voice is even better than in many science fiction films and is almost indistinguishable from ordinary human speech. Audiobooks have recently become widespread throughout the world. In different countries, different names have stuck to them: Audiobook, MP3-book, "electronic book", "talk...


28
May
2017

The KMPlayer 4.2.1.2 RePack (+ Portable)

Release year: 2014
Genre: Firmware
Developer: Highscreen
Developer site: http://highscreen.ru/
Interface language: Multilingual (Russian is present)
Platform: Android
System requirements: 1 GB internal memory, 1 GB random access memory
Description: Updated firmware version for Highscreen Zera_S (rev.a) Firmware installation1. Download the firmware utility https://yadi.sk/d/Dim7kjZePPcie 2. Download and install the PreLoader USB VCOM Driver https://yadi.sk/d/ZLbie_WQPPcxE 3. Run the SP Flash Tool, select the file in the Scatter-loading field MT6582_Android_scatter.txt which is in pa...

29
but I
2010

CoolBook 2.1.4

Release year: 2009
Genre: System tuning, system optimization
Developer: Coolbook
Developer website: http://www.coolbook.se/
Interface language: English
Platform: Intel only

Description: The program was created to prevent overheating of the MacBook. The program can adjust temperature, fan power, and much more... CoolBook lets you monitor CPU frequency, voltage, and temperature. Registered users may set voltage and frequency manually. This can drastically reduce heat dissipation and fan noise. Use your MacBook with full performance w ...


30
but I
2010

VirtualHostX 2.4.1

Release year: 2010
Genre: Virtualization
Developer: Tyler Hall
Developer site: http://clickontyler.com/virtualhostx/
Interface language: Russian
Platform: PPC/Intel universal
System requirements: Mac OS X 10.5 or higher
Description: VirtualHostX makes it easy to host multiple websites on your Mac. it perfect solution for web designers working on more than one project at the same time. With VirtualHostX you can easily create and manage virtual hosts with just a few clicks. VirtualHostX now offers greater control over your Apache settings, and...