Activity Logger
Activity Logger spying engine runs invisibly in background and records to the log file URLs of visited Internet sites with viewed page title, keystrokes in email, chat, instant messengers and other programs. Spy engine logs what programs users run
and how long they work in every program. Recorded log file can be periodically sent silently to email address, when computer goes online. This spy software can capture and save screenshots of computer desktop every several seconds. Severe risk threats
are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate
in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0
General information:
Malware Name: |
Activity Logger |
Malware Type: |
Key Logger |
Company Name: |
SoftActivity |
Company URL: |
http://softactivity.com/
|
Threat Level: |
Severe Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
SoftActivity includes Computer Monitoring, Internet Spy Software & Keylogger. Spy software for remote computer monitoring through LAN in real time or recording all Internets, email, chat and other activity on PC. Monitor employees or students
on network computers remotely. Monitor child on local home PC with our spy software for parental control with key logger module. Get full computer usage statistics. Keylogger software that runs invisible and records everything users do on their computers.
Spyware Description:
Activity Logger spying engine runs invisibly in background and records to the log file URLs of visited Internet sites with viewed page title, keystrokes in email, chat, instant messengers and other programs. Spy engine logs what programs users run
and how long they work in every program. Recorded log file can be periodically sent silently to email address, when computer goes online. This spy software can capture and save screenshots of computer desktop every several seconds. Severe risk threats
are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate
in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
alogcfg.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\Activity Logger\Templates\bottom.html |
12 |
HTML File |
C:\Program Files\Activity Logger\Templates\delim.csv |
115 |
Microsoft Excel Comma Separated Values File |
C:\Program Files\Activity Logger\unins000.dat |
4419 |
DAT File |
Folder information Created after Installation:
Folder Location |
C:\Program Files\Activity Logger |
C:\Program Files\Activity Logger\Templates |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is14 |
UninstallString |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is15 |
URLInfoAbout |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is16 |
URLUpdateInfo |