PAL Keylog Pro
PAL KeyLog Pro is a powerful keystroke recorder. KeyLog Pro records every keystroke made on computer on every window, even on password protected boxes. The software can start up whenever computer starts up. See everything being typed, emails, messages,
documents, web pages, usernames, passwords and more. It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network
connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0
General information:
Malware Name: |
PAL Keylog Pro |
Malware Type: |
Key Logger |
Company Name: |
PAL Solutions |
Company URL: |
http://palsol.com/
|
Threat Level: |
|
Operating System: |
|
Installation Type: |
|
Operation: |
|
Company Description:
PAL Solutions has expertise in providing E-Commerce and Software solutions to the finance, betting & gaming, healthcare and many other segments. Furthermore, the quality and cost effectiveness of its solutions allows it to provide an outsourcing
service to existing software developers. Its on-site team interacts with the customer to define requirements, create accurate estimates, review prototypes, coordinate development work and manage scope changes. It then can absorb the knowledge of the
client's requirements much faster and help in adding value to its client's business. The on-site team documents this information and communicates it to the offshore team by e-mail, text based chat, voice chat or conference calls. The on-site
team sends weekly status of the offshore work to the client so that the client is well aware of the progress.
Spyware Description:
PAL KeyLog Pro is a powerful keystroke recorder. KeyLog Pro records every keystroke made on computer on every window, even on password protected boxes. The software can start up whenever computer starts up. See everything being typed, emails, messages,
documents, web pages, usernames, passwords and more. It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network
connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
klpf.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\WINDOWS\system32\PAL\KLP\ZIP.EXE |
126976 |
Application |
C:\WINDOWS\system32\PAL\KLP\svchost.exe |
90112 |
Application |
C:\WINDOWS\system32\PAL\KLP\zip_copyright.txt |
2460 |
Text Document |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SYSTEMControlSet001ServicesWindows LAN Service Manager |
ImagePath |
HKEY_LOCAL_MACHINE |
SYSTEMCurrentControlSetServicesWindows LAN Service Manager |
ImagePath |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
klp |