to-spy-on

to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

General information:

Malware Name: to-spy-on
Malware Type: Key Logger
Company Name: to-spy-on Software
Company URL: http://to-spy-on.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

to-spy-on Software provides you the software to-spy-on that captures keystrokes, Capture programs used, Capture websites in Internet Explorer, Capture screenshots, Encrypted log file, Secretly email log files, Invisible Stealth Mode, Unique playback mode lets you view captured keystrokes/programs/web pages/screenshots in real time, Run silently at startup.

Spyware Description:

to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

Characteristics/Symptoms:

    -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent. -> It can severely compromise system security.

Additional information might be found here:

google Search at Google for to-spy-on
bing Search at Bing for to-spy-on
yahoo Search at Yahoo for to-spy-on

Processes Running:

TSODemo.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\TSO Demo\EventScheduler.mdb 364544 Microsoft Office Access Application
C:\Program Files\TSO Demo\Help.rtf 63241 Rich Text Format
C:\Program Files\TSO Demo\TSODemo.exe 942080 Application

Folder information Created after Installation:

Folder Location
C:\Program Files\TSO Demo
C:\Program Files\TSO Demo\projects

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} Changed0
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} SlowInfoCache0
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} [NULL]0