PAL Keylog Pro

PAL KeyLog Pro is a powerful keystroke recorder. KeyLog Pro records every keystroke made on computer on every window, even on password protected boxes. The software can start up whenever computer starts up. See everything being typed, emails, messages, documents, web pages, usernames, passwords and more. It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

General information:

Malware Name: PAL Keylog Pro
Malware Type: Key Logger
Company Name: PAL Solutions
Company URL: http://palsol.com/
Threat Level:
Operating System:
Installation Type:
Operation:

Company Description:

PAL Solutions has expertise in providing E-Commerce and Software solutions to the finance, betting & gaming, healthcare and many other segments. Furthermore, the quality and cost effectiveness of its solutions allows it to provide an outsourcing service to existing software developers. Its on-site team interacts with the customer to define requirements, create accurate estimates, review prototypes, coordinate development work and manage scope changes. It then can absorb the knowledge of the client's requirements much faster and help in adding value to its client's business. The on-site team documents this information and communicates it to the offshore team by e-mail, text based chat, voice chat or conference calls. The on-site team sends weekly status of the offshore work to the client so that the client is well aware of the progress.

Spyware Description:

PAL KeyLog Pro is a powerful keystroke recorder. KeyLog Pro records every keystroke made on computer on every window, even on password protected boxes. The software can start up whenever computer starts up. See everything being typed, emails, messages, documents, web pages, usernames, passwords and more. It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for PAL Keylog Pro
bing Search at Bing for PAL Keylog Pro
yahoo Search at Yahoo for PAL Keylog Pro

Processes Running:

klpf.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\WINDOWS\system32\PAL\KLP\ZIP.EXE 126976 Application
C:\WINDOWS\system32\PAL\KLP\svchost.exe 90112 Application
C:\WINDOWS\system32\PAL\KLP\zip_copyright.txt 2460 Text Document

Folder information Created after Installation:

Folder Location

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SYSTEMControlSet001ServicesWindows LAN Service Manager ImagePath
HKEY_LOCAL_MACHINE SYSTEMCurrentControlSetServicesWindows LAN Service Manager ImagePath
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Run klp