SC Keylog

SC-KeyLog logs all keyboard activity to a file. Every single typed character and control button can be logged. SC-KeyLog can be used to monitor productivity or to spy on others. Sc-keylog can also log the names of the programs used and the date and time of entered characters. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain.0

General information:

Malware Name: SC Keylog
Malware Type: Key Logger
Company Name: Soft-Central
Company URL: http://www.soft-central.net/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Soft-Central provides soft wares for the Monitoring software and Freeware. Some of its products are SC-Disk Info quickly shows how much disk space is being used by different directories, SC-KeyLog PRO is the ultimate stealth surveillance tool for recording computer usage. Secretly spy on remote computers and capture all keystrokes, system logon passwords, chat sessions, visited web sites and much more.

Spyware Description:

SC-KeyLog logs all keyboard activity to a file. Every single typed character and control button can be logged. SC-KeyLog can be used to monitor productivity or to spy on others. Sc-keylog can also log the names of the programs used and the date and time of entered characters. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browser’s homepage and search settings. These threats may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for SC Keylog
bing Search at Bing for SC Keylog
yahoo Search at Yahoo for SC Keylog

Processes Running:

Main.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\SC-KeyLog PRO DEMO\klhpA 1679 File
C:\Program Files\SC-KeyLog PRO DEMO\kllnA 65024 File
C:\Program Files\SC-KeyLog PRO DEMO\klrmA 11776 File

Folder information Created after Installation:

Folder Location
C:\Program Files\SC-KeyLog PRO DEMO

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO DisplayIcon
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SC-KeyLog PRO UninstallString