Activity Logger

Activity Logger spying engine runs invisibly in background and records to the log file URLs of visited Internet sites with viewed page title, keystrokes in email, chat, instant messengers and other programs. Spy engine logs what programs users run and how long they work in every program. Recorded log file can be periodically sent silently to email address, when computer goes online. This spy software can capture and save screenshots of computer desktop every several seconds. Severe risk threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

General information:

Malware Name: Activity Logger
Malware Type: Key Logger
Company Name: SoftActivity
Company URL: http://softactivity.com/
Threat Level: Severe Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

SoftActivity includes Computer Monitoring, Internet Spy Software & Keylogger. Spy software for remote computer monitoring through LAN in real time or recording all Internets, email, chat and other activity on PC. Monitor employees or students on network computers remotely. Monitor child on local home PC with our spy software for parental control with key logger module. Get full computer usage statistics. Keylogger software that runs invisible and records everything users do on their computers.

Spyware Description:

Activity Logger spying engine runs invisibly in background and records to the log file URLs of visited Internet sites with viewed page title, keystrokes in email, chat, instant messengers and other programs. Spy engine logs what programs users run and how long they work in every program. Recorded log file can be periodically sent silently to email address, when computer goes online. This spy software can capture and save screenshots of computer desktop every several seconds. Severe risk threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Activity Logger
bing Search at Bing for Activity Logger
yahoo Search at Yahoo for Activity Logger

Processes Running:

alogcfg.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Activity Logger\Templates\bottom.html 12 HTML File
C:\Program Files\Activity Logger\Templates\delim.csv 115 Microsoft Excel Comma Separated Values File
C:\Program Files\Activity Logger\unins000.dat 4419 DAT File

Folder information Created after Installation:

Folder Location
C:\Program Files\Activity Logger
C:\Program Files\Activity Logger\Templates

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is14 UninstallString
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is15 URLInfoAbout
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is16 URLUpdateInfo