007 Spy Software
007 Spy Software is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes,
passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. 007 Spy Software is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It
works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
General information:
Malware Name: |
007 Spy Software |
Malware Type: |
Key Logger |
Company Name: |
Spy Software |
Company URL: |
http://www.e-spy-software.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Spy Software provides you the software 007 Spy Software that is a stealthy computer monitoring software which allows you to secretly record all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas
of the system such as email sent, Web sites visited, every keystroke (including login/password of ICQ, MSN, AOL, AIM, and Yahoo Messenger or Webmail), file operations, online chat conversation, and take screen snapshot at set intervals just like a
surveillance camera directly point at the computer monitor.
Spyware Description:
007 Spy Software is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes,
passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. 007 Spy Software is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It
works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
Characteristics/Symptoms:
-> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.
Additional information might be found here:
Processes Running:
svchost.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
|
|
|