AtomicLog

It is designed to monitor user activity. May be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger, which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information to an outbound connection.0

General information:

Malware Name: AtomicLog
Malware Type: Spyware
Company Name: AtomicLog
Company URL: http://www.atomiclog.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

AtomicLog lets us keep our Internet activity under our control. AtomicLog provides the means for monitoring, analyzing, and filtering our Internet activity. Historical and real-time usage merges via an easy to use graphical interface. Monitor web site visits and activity, chartrooms sessions, videoconferencing sessions, file transfer session, e-mail both sent and received, and much more. Speeds our browsing by blocking unwanted ads and web sites, stop spyware and more. Works with AOL, Netscape Navigator, Internet Explorer, Opera, or any other Internet enabled program.

Spyware Description:

It is designed to monitor user activity. May be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger, which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information to an outbound connection.0

Characteristics/Symptoms:

    -> Ability to scan systems -> Monitor activity -> Relay information to another computer or locations in cyber-space -> Negatively affect the performance and stability of the system0

Additional information might be found here:

google Search at Google for AtomicLog
bing Search at Bing for AtomicLog
yahoo Search at Yahoo for AtomicLog

Processes Running:

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\[USER]\Start Menu\Programs\AtomicLog\AtomicLog Help.lnk 556 Shortcut
C:\Documents and Settings\[USER]\Start Menu\Programs\AtomicLog\readme.lnk 539 Shortcut
C:\Program Files\AtomicLog\AtomicLog.cnt 2226 CNT File

Folder information Created after Installation:

Folder Location
C:\Program Files\AtomicLog
C:\Program Files\AtomicLog\BACKUP

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallAtomicLog 2.3 DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AtomicLog 2.3 Publisher