KoloSoft SE
Automatically records every Keystrokes, Web sites visited, Emails, Instant Messages, Passwords, Who is logged on, Open applications and Chat Rooms. It is a Commercial Key Logger that is a program that captures and logs keystrokes as they are entered
on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being
monitored. 0
General information:
Malware Name: |
KoloSoft SE |
Malware Type: |
Key Logger |
Company Name: |
KoloSoft SE |
Company URL: |
http://www.kolosoft.com/
|
Threat Level: |
|
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
KoloSoft SE is a concise version of KoloSoft Intruder. It is compact in size, only uses 6 MB of disk space, and is ideal for older computers with less memory and downloads in 19 minutes 27 seconds on a 56K modem or 2 minutes 13 seconds on DSL / cable
modem. Yet, SE is powerful enough to capture everything a computer user enters or where they visit online. KoloSoft SE is completely hidden within your computer system after installation. The only way to access it is by entering a password, which
you choose, on your keyboard after a series of keystrokes. Each activity is logged with the date and time, keystrokes entered, what application was used along with the computer name and person who is logged on to that computer
Spyware Description:
Automatically records every Keystrokes, Web sites visited, Emails, Instant Messages, Passwords, Who is logged on, Open applications and Chat Rooms. It is a Commercial Key Logger that is a program that captures and logs keystrokes as they are entered
on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being
monitored. 0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstall{4C6D4AD8-D23E-47C9-816C-EB77FF7D009A} |
EstimatedSize |