Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Spyware.ActivityLog

Spyware.ActivityLog

Updated:
13 February 2007
Version:
2.5
Publisher:
Deep Software (www.softactivity.com)
Risk Impact:
Medium
File Names:
alogger.exe,alaware.dll,alogcfg.exe,alsys.exe,Emailer.dll,slgrl.dll,swkbhkl.dll
Systems Affected:
Windows

Behavior


When Spyware.ActivityLog is installed, it monitors user activity, logs keystrokes, takes screenshots, and sends the gathered information to an email that the installer specified.

Symptoms


The files are detected as Spyware.ActivityLog.

Behavior


This program must be manually installed.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 07 May 2019 revision 006
  • Initial Daily Certified version 20 July 2004
  • Latest Daily Certified version 07 May 2019 revision 008
  • Initial Weekly Certified release date 21 July 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Spyware.ActivityLog is a spyware program that monitors all user activity, logs keystrokes, and takes periodic screenshots. The user who installed the spyware can view the gathered information locally or by email.

When Spyware.ActivityLog is installed, it performs the following actions:
  1. Creates the following files in %ProgramFiles%\Activity Logger:

    • alaware.dll: A monitoring component.
    • alm.dat: Contains a disclaimer. This file is not malicious and will not be detected.
    • ALOGCFG.CNT: A configuration component. This file is not malicious and will not be detected.
    • alogcfg.exe: A configuration component.
    • alogcfg.GID: A configuration component. This file is not malicious and will not be detected.
    • ALOGCFG.HLP: A help file, which is not malicious and will not be detected.
    • alogger.url: A shortcut to a Web site.
    • alsys.exe: A monitoring component.
    • buyal.url: A shortcut to a Web site.
    • Emailer.dll: A library used for emailing the logs.
    • ijl15.dll: A valid JPEG library. This file is not malicious and will not be detected.
    • license.txt: A text file. This file is not malicious and will not be detected.
    • LogExp.dll: This is a library used for exporting logs to different formats. This file is not malicious and will not be detected.
    • mfc42.dll: A valid Microsoft library.
    • msvcrt.dll: A valid Microsoft library.
    • README.TXT: A text file, which is not malicious and will not be detected.
    • scrview.exe: A screenshot viewer. This file is not malicious and will not be detected.
    • slgrl.dll: A monitoring component.
    • swkbhkl.dll: A monitoring component.
    • unins000.dat: An uninstallation component.This file is not malicious and will not be detected.
    • unins000.exe: An uninstallation component. This file is not malicious and will not be detected.

      Note:
      %ProgramFiles% is a variable that refers to the path to the program files folder. By default, this is C:\Program Files.

  2. Creates the following files in %ProgramFiles%\Activity Logger\Templates :

    • bottom.html
    • delim.csv
    • first.html
    • head.html
    • header.csv
    • last.html
    • log.xls
    • logrec.html
    • scrshot.html
    • url.html

      Note: These files are templates used for reporting the logged information. These files are not malicious and will not be detected.

  3. Creates the following files in C:\Documents and Settings\All Users\Application Data\AL:

    • <date_time>.jpg
    • alog.swl

      Note: These files contain the logged information and screenshots. These files are not malicious and will not be detected.

  4. Creates the following file in C:\Documents and Settings\All Users\Application Data\Lgr:

    alprm.dat

    Note: This file contains the email address to which the information will be mailed. This file is not malicious and will not be detected.

  5. Creates the following shortcuts in C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger:

    • Activity Logger Configuration.lnk
    • Visit Activity Logger Website.lnk
    • Activity Logger Help.lnk
    • Uninstall Activity Logger.lnk

  6. Adds the value:

    "AISys" = "C:\Program Files\Activity Logger\\alsys.exe"

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    so that the spyware runs when you start Windows.

  7. Adds the values:

    "Install Log" = "1"
    "Install Scr" = "1"
    "Install DispWarn" = "0"
    "Install AutoStart" = "1"
    Install IsEml = "1"
    Install Email = "[EMAIL ADDRESS]"
    Del from uninstall = "0"

    to the registry subkey:

    HKEY_CURRENT_USER\Software\SoftActivity\Activity Logger\Configuration utility

  8. Adds the values:

    "Inno Setup: Setup Version" = "4.2.2"
    "Inno Setup: App Path" = "C:\Program Files\Activity Logger"
    "Inno Setup: Icon Group" = "Activity Logger"
    "Inno Setup: User" = "[USER_NAME]"
    "DisplayIcon" = "C:\Program Files\Activity Logger\alogcfg.exe"
    "UninstallString" = "C:\Program Files\Activity Logger\unins000.exe"
    "DisplayVersion" = "2.5"
    "Publisher" = "Deep Software"
    "URLInfoAbout" = "[http://]www.softactivity.com/[REMOVED]"
    "HelpLink" = "[http://]www.softactivity.com/[REMOVED]"
    "URLUpdateInfo" = "[http://]www.softactivity.com/[REMOVED]"

    to the registry subkey:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Winodws\CurrentVersion\Uninstall\{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is1

  9. Creates the files in %ProgramFiles%\Activity Logger\Logs called [DATE]_[TIME] with the extension .html,.cvs or .xls.

    Note:
    • These files contain the logged information and screenshots. These files are not malicious and will not be detected.
    • [DATE] is a variable that refers to the day the file was saved and [TIME] is a variable that refers to the time the file was saved.



The following instructions pertain to all Symantec antivirus products that support Security Risk detection.

Before You Begin:
This is a general removal procedure. This application may include an uninstallation tool named "unins000.exe" located in the installation folder. We suggest that, before you attempt to remove this spyware using the following instructions, try to uninstall it using the provided uninstaller.
  1. Update the definitions.
  2. Restart the computer in Safe mode.
  3. Run a full system scan.
  4. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. To update the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To restart the computer in Safe mode
Shut down the computer and turn off the power. Wait for at least 30 seconds, and then restart the computer in Safe mode or VGA mode. For instructions, read the document, "How to start the computer in Safe Mode ."

3. To run the scan
  1. Start your Symantec antivirus program, and then run a full system scan.

    Note: If you ran the Add/Remove programs applet as described in the previous section, all the files may have been removed, and thus none of them will be detected.

  2. If any files are detected as Spyware.ActivityLog and depending on which software version you are using, you may see one or more of the following options:

    Note: This applies only to versions of Norton AntiVirus that support Security Risk detection. If you are running a version of Symantec AntiVirus Corporate Edition that supports Security Risk detection, and Security Risk detection has been enabled, you will only see a message box that gives the results of the scan. If you have questions in this situation, contact your network administrator.

    • Exclude (Not recommended): If you click this button, it will set the threat so that it is no longer detectable. That is, the antivirus program will keep the security risk on your computer and will no longer detect it to remove from your computer.

    • Ignore or Skip: This option tells the scanner to ignore the threat for this scan only. It will be detected again the next time that you run a scan.

    • Cancel: This option is new to Norton Antivirus 2005. It is used when Norton Antivirus 2005 has determined that it cannot delete a security risk. This Cancel option tells the scanner to ignore the threat for this scan only, and thus, the threat will be detected again the next time that you run a scan.

      To actually delete the security risk:
      • Click its file name (under the Filename column).
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

    • Delete: This option will attempt to delete the detected files. In some cases, the scanner will not be able to do this.
      • If you see a message, "Delete Failed" (or similar message), manually delete the file.
      • Click the file name of the threat that is under the Filename column.
      • In the Item Information box that displays, write down the full path and file name.
      • Then use Windows Explorer to locate and delete the file.

        If Windows reports that it cannot delete the file, this indicates that the file is in use. In this situation, complete the rest of the instructions on this page, restart the computer in Safe mode, and then delete the file using Windows Explorer.

  3. Using Windows Explorer, delete the following files if they exist:

    • %ProgramFiles%\Activity Logger\alm.dat
    • %ProgramFiles%\Activity Logger\ALOGCFG.CNT
    • %ProgramFiles%\Activity Logger\alogcfg.GID
    • %ProgramFiles%\Activity Logger\ALOGCFG.HLP
    • %ProgramFiles%\Activity Logger\alogger.url
    • %ProgramFiles%\Activity Logger\buyal.url
    • %ProgramFiles%\Activity Logger\ijl15.dll
    • %ProgramFiles%\Activity Logger\license.txt
    • %ProgramFiles%\Activity Logger\LogExp.dll
    • %ProgramFiles%\Activity Logger\mfc42.dll
    • %ProgramFiles%\Activity Logger\msvcrt.dll
    • %ProgramFiles%\Activity Logger\README.TXT
    • %ProgramFiles%\Activity Logger\scrview.exe
    • %ProgramFiles%\Activity Logger\unins000.dat
    • %ProgramFiles%\Activity Logger\unins000.exe
    • %ProgramFiles%\Activity Logger\Templates\bottom.html
    • %ProgramFiles%\Activity Logger\Templates\delim.csv
    • %ProgramFiles%\Activity Logger\Templates\first.html
    • %ProgramFiles%\Activity Logger\Templates\head.html
    • %ProgramFiles%\Activity Logger\Templates\header.csv
    • %ProgramFiles%\Activity Logger\Templates\last.html
    • %ProgramFiles%\Activity Logger\Templates\log.xls
    • %ProgramFiles%\Activity Logger\Templates\logrec.html
    • %ProgramFiles%\Activity Logger\Templates\scrshot.html
    • %ProgramFiles%\Activity Logger\Templates\url.html
    • C:\Documents and Settings\All Users\Application Data\AL\<date_time>.jpg
    • C:\Documents and Settings\All Users\Application Data\AL\swlalog.swl
    • C:\Documents and Settings\All Users\Application Data\Lgr\alprm.dat
    • C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger\Activity Logger Configuration.lnk
    • C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger\Visit Activity Logger Website.lnk
    • C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger\Activity Logger Help.lnk
    • C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger\Uninstall Activity Logger.lnk

  4. Using Windows Explorer, delete the following folders if they exist:

    • %ProgramFiles%\Activity Logger
    • %ProgramFiles%\Activity Logger\Templates
    • %ProgramFiles%\Activity Logger\Logs
    • C:\Documents and Settings\All Users\Application Data\AL
    • C:\Documents and Settings\All Users\Application Data\Lgr
    • C:\Documents and Settings\All Users\Start Menu\Programs\ActivityLogger


4. To delete the values from the registry

Important: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.

a. Click Start > Run .

b. Type regedit

    Then click OK.

c. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

d. In the right pane, delete the value:
    "AISys" = "C:\Program Files\Activity Logger\alsys.exe"

e. Navigate to the key:
    HKEY_CURRENT_USER\Software

f. In the left pane, delete the subkey:
    "SoftActivity"

g. Navigate to the key:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Winodws\CurrentVersion\Uninstall


h. In the left pane, delete the subkey:
    "{F166CABE-0F32-4BE8-95BD-3E540C21A5DD}_is1"


k. Exit the Registry Editor.


l. Restart the computer.