Address for Bitcoin payments: 1BTjdYBoC3kTM99iZkskPpwtFRkVmjeEQD
HOW TO INSTALL OUR KEYLOGGER REMOTELY?
It’s easy. Aaron REMOTE Installable Keylogger (code name ARIK) can infect a MS Word file (.doc), MS Exel file (.xls) with macro exploit and .pdf or .exe file with our keylogger. After infecting, you can send infected file to your victim, and convince them to open it. After that, keylogger will be installed on their computer. You will receive reports on what does it do in the network, what does it write to friends, what are the passwords to websites to which it logs in. You will also receive its screenshots that will make you know all about what happens on the monitored computer.
FILES SUPPORTED BY THE PROGRAM
|Infected doc. files are real program files of MS Word 2007, or later. They can be sent to any e-mail accounts, they are not blocked by antiviruses, e-mail programs or e-mail servers. The infection makes the original file supplemented by the VBA code that after activation installs the keylogger on the target computer. The generated file always looks the same, its content includes the message, which recommends to run the macro. After running the macro, the keylogger is being installed in the background, while the original file of MS Word is opened on the screen, which you chose for infection in the generator. Running the macro in Office 2007 means two clicks, while from the 2010 version it only needs one click, which greatly facilitates the remote installation.|
Infected xls. files are real program files of MS Exel 2007, or later. They can be sent to any e-mail accounts, they are not blocked by antiviruses, e-mail programs or e-mail servers. The infection makes the original file supplemented by the VBA code that after activation installs the keylogger on the target computer. The generated file always looks the same, its content includes the message, which recommends to run the macro. After running the macro, the keylogger is being installed in the background, while the original file of MS Exel is opened on the screen, which you chose for infection in the generator. Running the macro in Office 2007 means two clicks, while from the 2010 version it only needs one click, which greatly facilitates the remote installation.
PDF files infected with the keylogger are in fact .exe files with the PDF icon. They are strikingly similar to Adobe Reader files. Once opened by the recipient, the keylogger is being installed in the background, and the original PDF files we infected, open on the screen. This type of file is not sent as an attachment to the e-mail. In order to deliver it to the recipient, we must place it on any server or website supporting the hosting of files (Google Drive, Dropbox, MEGA or other), and we send only the link to the file in the e-mail. The advantage of the PDF file is the quick installation in the background, and no need to run the macro for the installation of the keylogger. Instead of sending the PDF file, you can easily install the keylogger on the target computer personally, if we have physical access to it. The installation can also be performed under the supervision of the computer owner. Just run the PDF file from the memory stick or CD.
.exe files infected with the keylogger are in fact .exe files with the default Microsoft Windows installer icon. Once opened by the recipient, the keylogger is being installed in the background, and the original application installer we infected, open on the screen. This type of file is not sent as an attachment to the e-mail. In order to deliver it to the recipient, we must place it on any server or website supporting the hosting of files (Google Drive, Dropbox, MEGA or other), and we send only the link to the file in the e-mail. The advantage of the .exe file is the quick installation in the background, and no need to run the macro for the installation of the keylogger. Instead of sending the .exe file, you can easily install the keylogger on the target computer personally, if we have physical access to it. The installation can also be performed under the supervision of the computer owner. Just run the infected file from the memory stick or CD.
The latest anti-virus scan of the program.
How to infect Word file with keylogger and send it to victim.
Opening infected Word file in victim's computer.
"We offer you innovative software that can be remotely installed on any computer allowing you to discover the most hidden secrets of its user. Please, use it reasonably."
GENERAL KEYLOGGER FUNCTIONS
EASY REMOTE KEYLOGGER INSTALLATION BY E-MAIL
The program comes with Spy File Generator, which allows you to create files of Microsoft Word, Microsoft Excel, PDF or .exe application, infected with the keylogger. The file, after sending to the e-mail address of your victim, allows the installation of the keylogger. It is enough when the infected document of Word, Excel, PDF or .exe application is opened on the target computer. You can send infected MS Office file to any email providers like yahoo.com, hotmail.com, gmail.com or any other. Only our program can be sent by email (Word and Exel files). Pdf and exe files can’t be sent by gmail. Our program is invisible to any antivirus products.
100% INVISIBLE IN WINDOWS
After opening the infected file (or running the macro) by your victim, no warnings or messages are displayed. The keylogger is installed in the background. It does not have any icon on the toolbar, start menu or elsewhere. The program is not visible in the list of system processes in autostart. Even, if it is detected by the user, its files are encrypted, so it is not possible to determine where the keylogger comes from.
UNDETECTABLE BY ALMOST ALL ANTIVIRUSES
We regularly check whether out program is not detected by antiviruses. We counteract this by changing the program signature. Compared to competitive programs, we are the most invisible to antiviruses. As at 28.04.2016, the program is UNDETECTABLE by all of the most popular antiviruses
CAPTURE KEYSTROKE, PRINT SCREEN, WEBSITES LOGS, SAVED PASSWORDS
The software collects the data on what is typed in on keyboard of your computer, captures print screens, saved passwords and notifies of the visited websites. All information is delivered in an accessible form, it does not require any additional software to browse through it.
AUTOMATICALLY SENDING EMAIL REPORTS FROM KEYLOGGER
Keylogger automatically sends the collected data to your email address. You can set the time and the target email address for receiving the data.
|Features||Aaron Remote Installable Keylogger||Other keyloggers (Ardamax, Award, Perfect Keylogger…) having a possibility to be remotely installed in theory.|
|Infection technology||Iniection, the malicious codeis hidden within am Office file, it installs the keylogger via VBA Macro.||The infected file is a regular .exe application with the Word, Excel, or other icon.|
|Detectability with antivirus software||Low. It is proved by the reports from the Total Antivirus website.||Outdated solutions makes the keylogger inoperable because it is blocked by antivirus software, mail servers and mail programs.|
|Operation||It is easy to operate, only essential options used that can be accommodated in one window.||Very complicated, you have to fill in many sheets, get through many steps to activate software.|
Aaron Remote Manual
I. General program’s functionality
Capturing keyboard, screens, websites history, and sending the reports with results to the e-mail address. The program allows embedding the keylogger in Microsoft Word and Excel files starting from 2007 version to the newest. The additional functionality is the ability of infecting the installer of any desired program and pdf file. The installation of the keylogger on any target computer consists in sending the infected file and convincing the recipient to open and run it. After opening the document, the following message in the Office window appears:
Pursuant to this message, click on the “Settings” and then “Enable this content”.
To convince the recipient to open the macro is the assignment of the infected file forwarder. The reminiscence about the need of the macro opening in case the file does not run properly is usually sufficient.
See the video showing the opening of the infected Word file in practice in order to install the keylogger effectively:
II. Program configuration
The program has SPY FILE GENERATOR i.e. the window allowing the infection of Microsoft Word, Excel, pdf or .exe application file. It allows the setting of options to be activated after running the program on the target computer.
Spy File Generator (SFG) main window view:
1. „Browse file to infect” – By clicking, the window allowing to choose the file to be infected appears. Only compatible extensions are displayed in the window: doc, xls, pdf and exe.
2. „Capture keyboard” – The option allows keyboard capturing. All the keys are captured; if the keys like Shift, Enter… are pressed , it is noted in the report.
3. „Capture screenshots every …… minutes” – The option allows indicating the intervals of time in which printscreens are taken (after printscreen is taken, it is stored in the program and awaits sending to the e-mail address along with other report’s options).
4. „Capture screenshots when mouse click” – The option allows tracking the users’ actions by taking the printscreen directly after clicking (only clicks every 30 seconds are taken into consideration); when the clicks are frequent, they are not counted until the beginning of another 60 seconds countdown. The aim is to exclude a huge number of printscreens taken, e.g. during games.
5. „Capture websites history & passwords” – The option allows capturing websites addresses that are viewed by the user and all passwords saved in Chrome, Firefox and Internet Explorer browsers. The following information is considered in the websites report.
6. „Send results to email address……… every……… MB or ……hours” – The option allows configuring the intervals of time in which the reports are sent to given e-mail address. The time can be set in hours or in case the given megabytes amount of materials gathered is exceeded (mostly printscreens) the report is also sent.
7. „Use system account” – the ability of sending the logs from default, system account. The option simplifies the configuration. It makes that filling the option „Use my account” is not necessary. When the option is selected, the reports are sent from the account „email@example.com”.
8. “Use my account” – The option allows indicating one’s own data from which e-mails with reports are sent. It enables typing one’s own user name, password and setting the way of sending the e-mail. E-mail accounts with SSL and TLS encryptions and without encryption are handled. The option is advised to advanced users, after entering necessary data, their correctness shall be always checked by clicking “Test sending configuration”. By clicking, the statement confirming that the message was sent is displayed.
See the video with the program configuration:
III. Security and the license policy of the program
1. After receiving the key, the user gets the license key that allows generating the executable file infected with the keylogger. The number of program running days is assigned to each key. After pasting the key into the proper field and clicking the “GENERATE SPY FILE” button, the program checks whether the key is valid and whether it has been used. If the key is invalid or has been used, the program returns the information about the error:
„Your key is invalid or has been used. Do you want to buy a new license key? Visit www.remote-keylogger.net”
2. The key is for SINGLE USE only, so after generating the infected executable file on its basis, the key is blocked. It means that with the help of one key, we can generate only one file that can infect one computer. BASIC and ULTIMATE licenses have not got the running limit. In case of ULTIMATE license, can infect 100 files and for that reason it is the most frequently chosen type of license by professionals.
IV. Additional information and system requirements:
1. The program has been checked and tested on the following operating systems: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10.
Microsoft Office 2007 or newer, excluding “Starter” versions (as they have not got built in macros handling ability), is necessary for the opening of the infected MS Office file. Pdf and exe files, can be used without MS Office program.
2. The program is checked every 3 months for antiviruses detection, when it starts to be detected, we change its code so that it cannot be detected anymore. We kindly ask you to use only up to date program versions from the website remote-keylogger.net.
3. After the program installation on the target computer, it is utterly hidden in the system, there are no explicit tracks of its operation and the configuration file is encrypted. It is launched after each system startup.
4. SPY FILE GENERATOR does not require the installation.
5. Remote program uninstallation is possible only after sending a message to the e-mail address firstname.lastname@example.org. In the message topic the license key should be typed.
6. With a reference to numerous clients’ questions about the free trial version, we would like to inform you that there is no such in our present plans. We care about program’s non-detectability for antiviruses and the free trial version would cause the program’s prevalence and that it would be blocked. We enabled the purchase of limited in time version at a lower price. Thanks to such policy, the program is not available en masse and the clients who pay for the license get the elite and unknown for the antiviruses companies product.
REMOTE KEYLOGGER TIPS&TRICKS
We would like to show you the possibilities of our software and share some ideas concerning an effective and remote installation of our Keylogger.
We presume that you have already downloaded Spy File Generator, bought one of our licenses on Aaron Remote Installable Keylogger, and generated a Spy File (by infecting a Word file or an Application).
Your task is to send it within an email message to an user, whose computer is supposed to be invigilated by you. You have to do it in a way that will make the user open the attachment with the file infected with Keylogger.
If you want to be identified as a company (telephone service provider, university or others) you can use one of the numerous websites, e.g. Fake Mail. It will allow you to enter any sender’s address, which will make your message look credible. We recommend this one: https://emkei.cz/.
If you want to be fully anonymous, you can use the special browser Tor to send the email message:
Using a website like Fake Mail may make your message with Keylogger be placed in the “Spam” folder, so if you are a parent who wants to watch your child’s actions on their computer, use your own mailbox.
REMOTE INSTALLATION SERVICE
There is the possibility to order a remote installation of Keylogger with us on the email address provide by you. You have to provide us with the details on the user in order and their email address to offer you a quotation. If you want to buy remote installation service, you have to buy Aaron Remote Installable Keylogger ULTIMATE version.