to-spy-on
to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords,
incoming and outgoing chat conversations, all information is stored in encrypted log files. to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth
mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
General information:
Malware Name: |
to-spy-on |
Malware Type: |
Key Logger |
Company Name: |
to-spy-on Software |
Company URL: |
http://to-spy-on.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
to-spy-on Software provides you the software to-spy-on that captures keystrokes, Capture programs used, Capture websites in Internet Explorer, Capture screenshots, Encrypted log file, Secretly email log files, Invisible Stealth Mode, Unique playback
mode lets you view captured keystrokes/programs/web pages/screenshots in real time, Run silently at startup.
Spyware Description:
to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords,
incoming and outgoing chat conversations, all information is stored in encrypted log files. to-spy-on is a Keylogger that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth
mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0
Characteristics/Symptoms:
-> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent. -> It can severely compromise system security.
Additional information might be found here:
Processes Running:
TSODemo.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\TSO Demo\EventScheduler.mdb |
364544 |
Microsoft Office Access Application |
C:\Program Files\TSO Demo\Help.rtf |
63241 |
Rich Text Format |
C:\Program Files\TSO Demo\TSODemo.exe |
942080 |
Application |
Folder information Created after Installation:
Folder Location |
C:\Program Files\TSO Demo |
C:\Program Files\TSO Demo\projects |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} |
Changed0 |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} |
SlowInfoCache0 |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CAAEDDBA-90C1-41B9-ADA1-2955A7F952E9} |
[NULL]0 |