Screen Logger

Screen Logger is like a handy cam to our screen. It can record everything computer monitor displays on the screen. The main feature of Screen Logger is to capture screen and log it into log files to view at any time. This is very important feature if need to keep backups for work, do some troubleshooting on computer, or even if just want to know what happens to our system. It also includes severe risk threats that are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

General information:

Malware Name: Screen Logger
Malware Type: Key Logger
Company Name: Mikko Technology
Company URL: http://mikkotech.com/
Threat Level: Severe Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Mikko Technology provides security and utility software. Mikko Technology's mission is to create high quality software products. Product such as File Protector, Screen Logger is developed and tested before going to market to ensure the highest quality problem free software. Mikko Technology also gives excellent customer support to ensure customer satisfaction.

Spyware Description:

Screen Logger is like a handy cam to our screen. It can record everything computer monitor displays on the screen. The main feature of Screen Logger is to capture screen and log it into log files to view at any time. This is very important feature if need to keep backups for work, do some troubleshooting on computer, or even if just want to know what happens to our system. It also includes severe risk threats that are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Screen Logger
bing Search at Bing for Screen Logger
yahoo Search at Yahoo for Screen Logger

Processes Running:

slman.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\WINDOWS\system32\loadwin.exe 24 Application
C:\WINDOWS\system32\sldrv.dll 52 Application Extension
C:\WINDOWS\system32\zlib.dll 63 Application Extension

Folder information Created after Installation:

Folder Location
C:\Program Files\SL

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\ScreenLogger\MainFrame WindowStatus
HKEY_LOCAL_MACHINE \SOFTWARE\ScreenLogger\MainFrame X
HKEY_LOCAL_MACHINE \SOFTWARE\ScreenLogger\MainFrame Y