Boss Everyware
Boss Everyware is the right tool for computer monitoring. Hidden yet highly controllable logging, powerful data analysis and easy deployment make Boss Everyware the best tool for computer monitoring! Hidden yet highly controllable logging: A tiny
hidden program runs on the background, watches what user is doing and writes it into a log file or sends the logs by e-mail. It also includes high risk threats that are typically installed without user interaction through security exploits, and can
severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0
General information:
Malware Name: |
Boss Everyware |
Malware Type: |
Key Logger |
Company Name: |
Boss Everyware |
Company URL: |
http://bosseveryware.com/
|
Threat Level: |
High Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation |
Company Description:
Boss Everyware monitors computer usage for security, troubleshooting and time tracking purposes. The package includes a highly flexible monitoring program, powerful report tool and configuration utility. Monitoring program records user activity down
to each open window visited URL and typed keystroke. It is designed to take minimal system resources and does not affect system performance. Activity logs are written in common database formats which enables easy integration of Boss Everyware with
a larger IT management system. Report Manager enables log analysis at each level of detail. Configuration utility controls every aspect of computer monitoring and enables easy deployment of monitoring program across your network.
Spyware Description:
Boss Everyware is the right tool for computer monitoring. Hidden yet highly controllable logging, powerful data analysis and easy deployment make Boss Everyware the best tool for computer monitoring! Hidden yet highly controllable logging: A tiny
hidden program runs on the background, watches what user is doing and writes it into a log file or sends the logs by e-mail. It also includes high risk threats that are typically installed without user interaction through security exploits, and can
severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
BECONFIG.EXE
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\WINDOWS\system32\BEWLDR32.EXE |
510464 |
Application |
C:\WINDOWS\system32\WSA32.DLL |
32768 |
Application Extension |
C:\WINDOWS\system32\WSA32.EXE |
510464 |
Application |
Folder information Created after Installation:
Folder Location |
C:\Documents and Settings\User\Start Menu\Programs\Boss Everyware 2 |
C:\WINDOWS\system32\Wsa32 |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallBoss Everyware 2.8_is1 |
URLInfoAbout |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallBoss Everyware 2.8_is1 |
URLUpdateInfo |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallBoss Everyware 2.8_is1 |
UninstallString |