Surf Spy

It is a Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction. 0

General information:

Malware Name:Surf Spy
Malware Type:Key Logger
Company Name:Sureshot
Company URL:http://www.sureshotsoftware.com/
Threat Level:Severe Risk
Operating System:WIN XP
Installation Type:Installed through EXE
Operation:Time of After Installation.

Company Description:

Sureshot, a division of Bysoft DATA AB, was established in 2000 by two of the developers. Bysoft DATA AB is a privately-held Swedish company. When Bysoft DATA AB moved their target audience from Sweden to include the rest of the world Sureshot emerged naturally. Today, Sureshot provides award winning software that empowers hundreds of thousands users in more than 150 countries. Sureshot have a high quality software arsenal, ranging from security to developer titles. It provides software for both individuals and enterprises and it is continually working to improve existing products and introduce new ones to satisfy our needs.

Spyware Description:

It is a Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction. 0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

googleSearch at Google for Surf Spy
bingSearch at Bing for Surf Spy
yahooSearch at Yahoo for Surf Spy

Processes Running:

config.exe

File information Created after Installation:

File LocationSize (Bytes)Type
C:\Program Files\session client\config.exe688128Application
C:\Program Files\session client\system\sescli.cfg1718Microsoft Office Outlook Configuration File
C:\Program Files\session client\system\sescli.exe729088Application

Folder information Created after Installation:

Folder Location
C:\Program Files\session client

Registry information Created after Installation:

Main Registry KeySub Registry KeyKey Value Name