Personal Inspector

Personal Inspector is a key logger which records all keystrokes.It can automatically track addresses and titles of all visited web pages, record all keystrokes (including passwords), save contents of Windows clipboard and take screen captures of the desktop and working application windows. All collected data is stored in the secret directory on the local computer and can be accessed anytime from this machine or via the local network. It includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

General information:

Malware Name: Personal Inspector
Malware Type: Key Logger
Company Name: Personal Inspector
Company URL: http://personal-inspector.com/
Threat Level: High Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Personal Inspector is an employee monitoring / parental control tool that monitors all computer activity and Internet usage. It can automatically track addresses and titles of all visited web pages, record all keystrokes (including passwords), save contents of Windows clipboard and take screen captures of the desktop and working application windows. All collected data is stored in the secret directory on the local computer and can be accessed anytime from this machine or via the local network. The software is very easy to use, small, fast-running and takes little system resources.

Spyware Description:

Personal Inspector is a key logger which records all keystrokes.It can automatically track addresses and titles of all visited web pages, record all keystrokes (including passwords), save contents of Windows clipboard and take screen captures of the desktop and working application windows. All collected data is stored in the secret directory on the local computer and can be accessed anytime from this machine or via the local network. It includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Personal Inspector
bing Search at Bing for Personal Inspector
yahoo Search at Yahoo for Personal Inspector

Processes Running:

svcmon.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\WINDOWS\system32\PIN\Icons\TrayIcon00.ico 1150 Icon
C:\WINDOWS\system32\PIN\Icons\TrayIcon02.ico 1150 Icon
C:\WINDOWS\system32\PIN\Icons\TrayIcon03.ico 1150 Icon

Folder information Created after Installation:

Folder Location
C:\WINDOWS\system32\PIN
C:\WINDOWS\system32\PIN\Icons

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallPersonal-Inspector DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\KMiNT21\PersonalInspector Start Menu Folder
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Personal-Inspector UninstallString