Surf Spy
It is a Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key
logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons
being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction. 0
General information:
Malware Name: |
Surf Spy |
Malware Type: |
Key Logger |
Company Name: |
Sureshot |
Company URL: |
http://www.sureshotsoftware.com/
|
Threat Level: |
Severe Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Sureshot, a division of Bysoft DATA AB, was established in 2000 by two of the developers. Bysoft DATA AB is a privately-held Swedish company. When Bysoft DATA AB moved their target audience from Sweden to include the rest of the world Sureshot emerged
naturally. Today, Sureshot provides award winning software that empowers hundreds of thousands users in more than 150 countries. Sureshot have a high quality software arsenal, ranging from security to developer titles. It provides software for both
individuals and enterprises and it is continually working to improve existing products and introduce new ones to satisfy our needs.
Spyware Description:
It is a Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key
logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being
monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction. 0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
config.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\session client\config.exe |
688128 |
Application |
C:\Program Files\session client\system\sescli.cfg |
1718 |
Microsoft Office Outlook Configuration File |
C:\Program Files\session client\system\sescli.exe |
729088 |
Application |
Folder information Created after Installation:
Folder Location |
C:\Program Files\session client |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |