Powered Keylogger
This is software designed to monitor a userâs activity, such as the keystrokes typed or screen shots. These programs are typically installed by the computer owner or administrator and should only be removed if unexpected. Powered Keylogger
logs keystrokes typed into our computer, records typing while in chat groups, e-mail programs, instant messages, and word processors, tracks mouse clicks, and takes screenshots. It includes Moderate risk threats that are often bundled with functionally
unrelated software or installed without adequate notice and consent, and may display unwanted advertising on the user's desktop. Such threats may track users' online browsing habits and transmit non-personally identifying data back to a server
in order to target advertising.0
General information:
Malware Name: |
Powered Keylogger |
Malware Type: |
Key Logger |
Company Name: |
ELTIMA Software |
Company URL: |
http://www.eltima.com/
|
Threat Level: |
Moderate Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
ELTIMA Software GmbH is a global information technology company, specializing in virtual serial communications, multimedia software development and quality web-development solutions. ELTIMA Software GmbH is based in Berlin, Germany, and has offices
located in other European countries. Over the past years of successful software development and provision it have earned a proven reputation of a reliable partner for delivering high quality software solutions across a broad spectrum of technologies
to companies all over the world. Its primary areas of expertise are in providing world class software development and outsourcing services to its clients.
Spyware Description:
This is software designed to monitor a userâs activity, such as the keystrokes typed or screen shots. These programs are typically installed by the computer owner or administrator and should only be removed if unexpected. Powered Keylogger
logs keystrokes typed into our computer, records typing while in chat groups, e-mail programs, instant messages, and word processors, tracks mouse clicks, and takes screenshots. It includes Moderate risk threats that are often bundled with functionally
unrelated software or installed without adequate notice and consent, and may display unwanted advertising on the user's desktop. Such threats may track users' online browsing habits and transmit non-personally identifying data back to a server
in order to target advertising.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
PKViewer.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\All Users\Start Menu\Programs\Powered_Keylogger\Powered Keylogger manual.lnk |
unknown |
524 Bytes |
C:\Documents and Settings\All Users\Start Menu\Programs\Powered_Keylogger\Powered Keylogger.lnk |
519 |
Shortcut |
C:\WINDOWS\Keylogger\web.flt |
2850 |
FLT File |
Folder information Created after Installation:
Folder Location |
C:\WINDOWS\Keylogger |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |