Exploit Child Watchdog

The Child WATCHDOG software has been designed to help parents of older kids (11 ) obtain peace of mind. The software gives you, the parent, a method of checking what your children have been using your computer for, in your absence, without them knowing. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability.0

General information:

Malware Name: Exploit Child Watchdog
Malware Type: Surveillance (General), Keylogger
Company Name: HandyArchive.com
Company URL: http://www.handyarchive.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

HandyArchive.com provides various software. HandyArchive.com tracks user traffic patterns throughout HandyArchive.com and this information is correlated with data about individual users. Overall usage statistics, according to a user's domain name, browser type and MIME type gotten by reading this information from the browser string (information contained in every user's browser), are also broken down. HandyArchive.com also tracks and catalogs the search terms that customers enter into our search tools, but this tracking is never associated with individual users. This site has security measures in place to protect the loss, misuse and alteration of the information under its control.

Spyware Description:

The Child WATCHDOG software has been designed to help parents of older kids (11 ) obtain peace of mind. The software gives you, the parent, a method of checking what your children have been using your computer for, in your absence, without them knowing. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact our computer’s performance and stability.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Exploit Child Watchdog
bing Search at Bing for Exploit Child Watchdog
yahoo Search at Yahoo for Exploit Child Watchdog

Processes Running:

eitcwd.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\eitcwd\INSTALL.LOG 2460 Text Document
C:\Program Files\eitcwd\UNWISE.EXE 149504 Application

Folder information Created after Installation:

Folder Location
C:\Program Files\eitcwd
C:\Program Files\eitcwd\BACKUP

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_CURRENT_USER \Software\Exploit Information Technology Limited\CWD\Default WL
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallExploit Child Watchdog DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Exploit Child Watchdog UninstallString