Boolosoft Keylogger
It is a keylogger that logs keystrokes on the victim's machine without his/her consent. A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged
data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used
legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.0
General information:
Malware Name: |
Boolosoft Keylogger |
Malware Type: |
Key Logger |
Company Name: |
Boolosoft |
Company URL: |
http://boolosoft.com/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Boolosoft Keylogger is easy to use keylogger. Support Engish and Korean, Chinese, Japanese and other Asian languages. Support logs multiple computers and views all the log files through Web. DonÃt need an Email Box or FTP, no boring setting.
It's free to use if we just want to record our own computer.
Spyware Description:
It is a keylogger that logs keystrokes on the victim's machine without his/her consent. A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged
data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately
if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Starts with the operating system -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log0
Additional information might be found here:
Processes Running:
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
Folder information Created after Installation:
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |