Screen Logger
Screen Logger is like a handy cam to our screen. It can record everything computer monitor displays on the screen. The main feature of Screen Logger is to capture screen and log it into log files to view at any time. This is very important feature
if need to keep backups for work, do some troubleshooting on computer, or even if just want to know what happens to our system. It also includes severe risk threats that are typically installed without user interaction through security exploits,
and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit
sensitive data to a remote server.0
General information:
Malware Name: |
Screen Logger |
Malware Type: |
Key Logger |
Company Name: |
Mikko Technology |
Company URL: |
http://mikkotech.com/
|
Threat Level: |
Severe Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Mikko Technology provides security and utility software. Mikko Technology's mission is to create high quality software products. Product such as File Protector, Screen Logger is developed and tested before going to market to ensure the highest
quality problem free software. Mikko Technology also gives excellent customer support to ensure customer satisfaction.
Spyware Description:
Screen Logger is like a handy cam to our screen. It can record everything computer monitor displays on the screen. The main feature of Screen Logger is to capture screen and log it into log files to view at any time. This is very important feature
if need to keep backups for work, do some troubleshooting on computer, or even if just want to know what happens to our system. It also includes severe risk threats that are typically installed without user interaction through security exploits, and
may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive
data to a remote server.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
slman.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\WINDOWS\system32\loadwin.exe |
24 |
Application |
C:\WINDOWS\system32\sldrv.dll |
52 |
Application Extension |
C:\WINDOWS\system32\zlib.dll |
63 |
Application Extension |
Folder information Created after Installation:
Folder Location |
C:\Program Files\SL |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\ScreenLogger\MainFrame |
WindowStatus |
HKEY_LOCAL_MACHINE |
\SOFTWARE\ScreenLogger\MainFrame |
X |
HKEY_LOCAL_MACHINE |
\SOFTWARE\ScreenLogger\MainFrame |
Y |