AtomicLog
It is designed to monitor user activity. May be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger,
which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information
to an outbound connection.0
General information:
Malware Name: |
AtomicLog |
Malware Type: |
Spyware |
Company Name: |
AtomicLog |
Company URL: |
http://www.atomiclog.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
AtomicLog lets us keep our Internet activity under our control. AtomicLog provides the means for monitoring, analyzing, and filtering our Internet activity. Historical and real-time usage merges via an easy to use graphical interface. Monitor web
site visits and activity, chartrooms sessions, videoconferencing sessions, file transfer session, e-mail both sent and received, and much more. Speeds our browsing by blocking unwanted ads and web sites, stop spyware and more. Works with AOL, Netscape
Navigator, Internet Explorer, Opera, or any other Internet enabled program.
Spyware Description:
It is designed to monitor user activity. May be used with or without consent. Because it is sold commercially, many anti-virus vendors do not detect them. The most common form of a commercial monitoring tool comes in the form of a keystroke logger,
which intercepts keystrokes from the keyboard and records them in a log. This can then be sent to whoever installed the software, or keylogger, onto the machine. Some Commercial Monitoring Software may take screenshots or video and send the information
to an outbound connection.0
Characteristics/Symptoms:
-> Ability to scan systems -> Monitor activity -> Relay information to another computer or locations in cyber-space -> Negatively affect the performance and stability of the system0
Additional information might be found here:
Processes Running:
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Start Menu\Programs\AtomicLog\AtomicLog Help.lnk |
556 |
Shortcut |
C:\Documents and Settings\[USER]\Start Menu\Programs\AtomicLog\readme.lnk |
539 |
Shortcut |
C:\Program Files\AtomicLog\AtomicLog.cnt |
2226 |
CNT File |
Folder information Created after Installation:
Folder Location |
C:\Program Files\AtomicLog |
C:\Program Files\AtomicLog\BACKUP |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallAtomicLog 2.3 |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AtomicLog 2.3 |
Publisher |