Fingerprints
It is a keylogger which logs keystrokes on the victimâs machine without his/her consent. It captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is
saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored.0
General information:
Malware Name: |
Fingerprints |
Malware Type: |
Key Logger |
Company Name: |
Gore Research |
Company URL: |
http://gore-research.com/
|
Threat Level: |
Moderate Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Gore Research provides custom-tailored software and web site design to event-planning and consultation. One of its software is Fingerprints. Fingerprints are a simple solution for parents and employers who need to enforce a computer usage policy.
After a single-click install, it will invisibly record all keystrokes, effectively revealing web sites visited, e-mail messages sent, chat conversations, and even passwords.
Spyware Description:
It is a keylogger which logs keystrokes on the victimâs machine without his/her consent. It captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is
saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\WINDOWS\system32\sysproc.exe |
249856 |
Application |
C:\fingerprints\Fingerprints.exe |
393216 |
Application |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |