Recorder
It is a key logger is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data may be encrypted and is typically sent to a remote attacker. The key logger is usually hidden from the
user and may use cloaking (rootkit) technology to hide from other software in order to evade detection by anti-malware applications. Key loggers may be installed by trojans with other malicious software through exploits, and are often used by online
criminal gangs to facilitate identity theft and bank fraud operations. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browserâs
homepage and search settings.0
General information:
Malware Name: |
Recorder |
Malware Type: |
Key Logger |
Company Name: |
Kra-Tronic |
Company URL: |
http://www.kratronic.com/
|
Threat Level: |
|
Operating System: |
|
Installation Type: |
|
Operation: |
|
Company Description:
Sometimes working on a PC is very boring. This is especially true for repeating tasks, which are always the same. Actually these tasks could be automated, if we just had an appropriate tool. Well, the suffering has an end. Kra-Tronic offers a solution
against boredom. The Mouse and Key Recorder allow to record whole tasks and replay them again and again. The Close all Windows Tool automatically removes all the many windows accumulated during working on the PC.
Spyware Description:
It is a key logger is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data may be encrypted and is typically sent to a remote attacker. The key logger is usually hidden from the
user and may use cloaking (rootkit) technology to hide from other software in order to evade detection by anti-malware applications. Key loggers may be installed by trojans with other malicious software through exploits, and are often used by online
criminal gangs to facilitate identity theft and bank fraud operations. It includes Elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browserâs
homepage and search settings.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
Recorder.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\Recorder\Example.krc |
243 |
KRC File |
C:\Program Files\Recorder\NLS\Swedish.lng |
711 |
LNG File |
C:\Program Files\Recorder\Recorder.chm |
260835 |
Compiled HTML Help file |
Folder information Created after Installation:
Folder Location |
C:\Program Files\Recorder |
C:\Program Files\Recorder\NLS |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallST6UNST #1 |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ST6UNST #1 |
ApplicationName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ST6UNST #1 |
UninstallString |