Visual Predator Toolkit
Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications
including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on
the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted
log files.0
General information:
Malware Name: |
Visual Predator Toolkit |
Malware Type: |
Key Logger |
Company Name: |
L. F. Grundy Software Co. |
Company URL: |
http://pcleanser.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
L. F. Grundy Software Co. provides you the software Visual Predator Toolkit that is a parental control tool that can monitor online activities. Its features are as follows: Take screenshots at set interval of time, record all URLs visited, manually
block any program on the hard drive, block porn movies and pictures, etc.
Spyware Description:
Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications
including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the
computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted
log files.0
Characteristics/Symptoms:
-> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.
Additional information might be found here:
Processes Running:
svchosts.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\VP Toolkit\data\Applications.txt |
190 |
Text Document |
C:\Program Files\VP Toolkit\data\keywords.txt |
14968 |
Text Document |
C:\Program Files\VP Toolkit\images2\logo.jpg |
11580 |
JPEG Image |
Folder information Created after Installation:
Folder Location |
C:\Program Files\VP Toolkit |
C:\Program Files\VP Toolkit\data |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_CURRENT_USER |
\Software\VB and VBA Program Settings\PornCleanser |
[NULL]0 |
HKEY_CURRENT_USER |
\Software\VB and VBA Program Settings\PornCleanser\Settings |
AutoStartupFlag0 |
HKEY_CURRENT_USER |
\Software\VB and VBA Program Settings\PornCleanser\Settings |
[NULL]0 |