PC Acme

PC Activity Monitor (PC ACME) products are designed for monitoring of user's PC activity. PC Acme can work under Windows 2000/XP operating systems. All the data collected by the monitoring agent are saved to the encrypted log file located on a user's machine. The monitoring agent works in the background transparently for the user, on the level of OS kernel driver. Severe risk threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

General information:

Malware Name: PC Acme
Malware Type: Key Logger
Company Name: Raytown Corporation LLC
Company URL: http://softsecurity.com/
Threat Level:
Operating System:
Installation Type:
Operation:

Company Description:

Raytown Corporation LLC is an independent monitoring and anti-monitoring software developing company. Its specialists have more than 10 years of experience in information protection. Today its products and custom solutions may be found in more than 80 countries all over the world, including a large number of Fortune 500 companies, law enforcement, government organizations, and military agencies. Its information security technologies are used all over the globe. Its software is a perfect example of ability to combine software development skills with a deep understanding of the state-of-the-art solutions in information security.

Spyware Description:

PC Activity Monitor (PC ACME) products are designed for monitoring of user's PC activity. PC Acme can work under Windows 2000/XP operating systems. All the data collected by the monitoring agent are saved to the encrypted log file located on a user's machine. The monitoring agent works in the background transparently for the user, on the level of OS kernel driver. Severe risk threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for PC Acme
bing Search at Bing for PC Acme
yahoo Search at Yahoo for PC Acme

Processes Running:

view.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\User\Start Menu\Programs\PC Acme\Control Center.lnk 630 Shortcut
C:\Documents and Settings\User\Start Menu\Programs\PC Acme\Help.lnk 611 Shortcut
C:\Program Files\PC Acme\control.exe 233583 Application

Folder information Created after Installation:

Folder Location
C:\Program Files\PC Acme

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallPC Acme uninstall DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\PC Acme uninstall SlowInfoCache
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PC Acme uninstall UninstallString