Recorder

It is a key logger is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data may be encrypted and is typically sent to a remote attacker. The key logger is usually hidden from the user and may use cloaking (rootkit) technology to hide from other software in order to evade detection by anti-malware applications. Key loggers may be installed by trojans with other malicious software through exploits, and are often used by online criminal gangs to facilitate identity theft and bank fraud operations. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings.0

General information:

Malware Name: Recorder
Malware Type: Key Logger
Company Name: Kra-Tronic
Company URL: http://www.kratronic.com/
Threat Level:
Operating System:
Installation Type:
Operation:

Company Description:

Sometimes working on a PC is very boring. This is especially true for repeating tasks, which are always the same. Actually these tasks could be automated, if we just had an appropriate tool. Well, the suffering has an end. Kra-Tronic offers a solution against boredom. The Mouse and Key Recorder allow to record whole tasks and replay them again and again. The Close all Windows Tool automatically removes all the many windows accumulated during working on the PC.

Spyware Description:

It is a key logger is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data may be encrypted and is typically sent to a remote attacker. The key logger is usually hidden from the user and may use cloaking (rootkit) technology to hide from other software in order to evade detection by anti-malware applications. Key loggers may be installed by trojans with other malicious software through exploits, and are often used by online criminal gangs to facilitate identity theft and bank fraud operations. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Recorder
bing Search at Bing for Recorder
yahoo Search at Yahoo for Recorder

Processes Running:

Recorder.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Recorder\Example.krc 243 KRC File
C:\Program Files\Recorder\NLS\Swedish.lng 711 LNG File
C:\Program Files\Recorder\Recorder.chm 260835 Compiled HTML Help file

Folder information Created after Installation:

Folder Location
C:\Program Files\Recorder
C:\Program Files\Recorder\NLS

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallST6UNST #1 DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ST6UNST #1 ApplicationName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ST6UNST #1 UninstallString