KeyTrapper
KeyTrapper records system keys. It captures all passwords, email, chat room conversation, instant messages, and system keys and started automatically at the system startup. It includes High risk threats that are typically installed without user interaction
through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. These
threats may also collect and transmit personally identifiable information (PII) without our consent and severely degrade the performance and stability of our computer.0
General information:
Malware Name: |
KeyTrapper |
Malware Type: |
Key Logger |
Company Name: |
KeyTrapper |
Company URL: |
http://www.keytrapper.com/
|
Threat Level: |
High Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
KeyTrapper capture all passwords, email, chat room conversation, instant messages, and system keys (F1, ESC, CTRL, etc.). An alert email will be sent when Enter keywords or phrases are detected in the search list we create. KeyTrapper will not appear
on the PC Desktop, Task Manager, System Tray, or Add/Remove Programs Menu. Recording begins automatically when a user logs in or the computer is restarted. The program can only
Spyware Description:
KeyTrapper records system keys. It captures all passwords, email, chat room conversation, instant messages, and system keys and started automatically at the system startup. It includes High risk threats that are typically installed without user interaction
through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. These
threats may also collect and transmit personally identifiable information (PII) without our consent and severely degrade the performance and stability of our computer.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\pcp\PcpLib.dll |
28672 |
Application Extension |
C:\Program Files\pcp\keytrapper.exe |
61440 |
Application |
C:\Program Files\pcp\svcwrd.exe |
65536 |
Application |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |