SC Keylog
SC-KeyLog logs all keyboard activity to a file. Every single typed character and control button can be logged. SC-KeyLog can be used to monitor productivity or to spy on others. Sc-keylog can also log the names of the programs used and the date and
time of entered characters. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browserâs homepage and search settings. These threats
may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain.0
General information:
Malware Name: |
SC Keylog |
Malware Type: |
Key Logger |
Company Name: |
Soft-Central |
Company URL: |
http://www.soft-central.net/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Soft-Central provides soft wares for the Monitoring software and Freeware. Some of its products are SC-Disk Info quickly shows how much disk space is being used by different directories, SC-KeyLog PRO is the ultimate stealth surveillance tool for
recording computer usage. Secretly spy on remote computers and capture all keystrokes, system logon passwords, chat sessions, visited web sites and much more.
Spyware Description:
SC-KeyLog logs all keyboard activity to a file. Every single typed character and control button can be logged. SC-KeyLog can be used to monitor productivity or to spy on others. Sc-keylog can also log the names of the programs used and the date and
time of entered characters. It includes elevated threats that are typically installed without adequate notice and consent, and may make unwanted changes to system, such as reconfiguring browserâs homepage and search settings. These threats
may install advertising-related add-ons, including toolbars and search bars, or insert advertising-related components into the Winsock Layered Service Provider chain.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
Main.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\SC-KeyLog PRO DEMO\klhpA |
1679 |
File |
C:\Program Files\SC-KeyLog PRO DEMO\kllnA |
65024 |
File |
C:\Program Files\SC-KeyLog PRO DEMO\klrmA |
11776 |
File |
Folder information Created after Installation:
Folder Location |
C:\Program Files\SC-KeyLog PRO DEMO |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO |
DisplayIcon |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SC-KeyLog PRO |
UninstallString |