Visual Predator Toolkit

Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

General information:

Malware Name: Visual Predator Toolkit
Malware Type: Key Logger
Company Name: L. F. Grundy Software Co.
Company URL: http://pcleanser.com/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

L. F. Grundy Software Co. provides you the software Visual Predator Toolkit that is a parental control tool that can monitor online activities. Its features are as follows: Take screenshots at set interval of time, record all URLs visited, manually block any program on the hard drive, block porn movies and pictures, etc.

Spyware Description:

Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual Predator Toolkit is a keylogger with elevated risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

Characteristics/Symptoms:

    -> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.

Additional information might be found here:

google Search at Google for Visual Predator Toolkit
bing Search at Bing for Visual Predator Toolkit
yahoo Search at Yahoo for Visual Predator Toolkit

Processes Running:

svchosts.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\VP Toolkit\data\Applications.txt 190 Text Document
C:\Program Files\VP Toolkit\data\keywords.txt 14968 Text Document
C:\Program Files\VP Toolkit\images2\logo.jpg 11580 JPEG Image

Folder information Created after Installation:

Folder Location
C:\Program Files\VP Toolkit
C:\Program Files\VP Toolkit\data

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_CURRENT_USER \Software\VB and VBA Program Settings\PornCleanser [NULL]0
HKEY_CURRENT_USER \Software\VB and VBA Program Settings\PornCleanser\Settings AutoStartupFlag0
HKEY_CURRENT_USER \Software\VB and VBA Program Settings\PornCleanser\Settings [NULL]0