Exploit Child Watchdog
The Child WATCHDOG software has been designed to help parents of older kids (11 ) obtain peace of mind. The software gives you, the parent, a method of checking what your children have been using your computer for, in your absence, without them knowing.
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability.0
General information:
Malware Name: |
Exploit Child Watchdog |
Malware Type: |
Surveillance (General), Keylogger |
Company Name: |
HandyArchive.com |
Company URL: |
http://www.handyarchive.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
HandyArchive.com provides various software. HandyArchive.com tracks user traffic patterns throughout HandyArchive.com and this information is correlated with data about individual users. Overall usage statistics, according to a user's domain name,
browser type and MIME type gotten by reading this information from the browser string (information contained in every user's browser), are also broken down. HandyArchive.com also tracks and catalogs the search terms that customers enter into our
search tools, but this tracking is never associated with individual users. This site has security measures in place to protect the loss, misuse and alteration of the information under its control.
Spyware Description:
The Child WATCHDOG software has been designed to help parents of older kids (11 ) obtain peace of mind. The software gives you, the parent, a method of checking what your children have been using your computer for, in your absence, without them knowing.
It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to our system, such as reconfiguring our browserâs homepage and search settings. These threats may install advertising-related
add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain. These new add-ons and components may block or redirect our preferred network connections, and can negatively impact
our computerâs performance and stability.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
eitcwd.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\eitcwd\INSTALL.LOG |
2460 |
Text Document |
C:\Program Files\eitcwd\UNWISE.EXE |
149504 |
Application |
Folder information Created after Installation:
Folder Location |
C:\Program Files\eitcwd |
C:\Program Files\eitcwd\BACKUP |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_CURRENT_USER |
\Software\Exploit Information Technology Limited\CWD\Default |
WL |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallExploit Child Watchdog |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Exploit Child Watchdog |
UninstallString |