Visual TimeAnalyzer

Visual TimeAnalyzer is a keylogger with high risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual TimeAnalyzer is a keylogger with high risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

General information:

Malware Name: Visual TimeAnalyzer
Malware Type: Key Logger
Company Name: Neuber Software
Company URL: http://neuber.com/
Threat Level: High Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation

Company Description:

Neuber Software provides you the software Visual TimeAnalyzer that is an extensive reporting timesheet, project and time tracking software. The easy to use application automatically tracks all computer activities, working time, pauses, projects, costs, software and internet use and presents detailed, richly illustrated reports. You learn which programs were used for how long, when, and by whom.

Spyware Description:

Visual TimeAnalyzer is a keylogger with high risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files. Visual TimeAnalyzer is a keylogger with high risk that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. It works in stealth mode. It tracks all the computer activities and applications including keyboard strokes, passwords, incoming and outgoing chat conversations, all information is stored in encrypted log files.0

Characteristics/Symptoms:

    -> It can severely compromise system security. -> It works in stealth mode. -> It collects and transmits personally identifiable information (PII) without your consent.

Additional information might be found here:

google Search at Google for Visual TimeAnalyzer
bing Search at Bing for Visual TimeAnalyzer
yahoo Search at Yahoo for Visual TimeAnalyzer

Processes Running:

Analyzer.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Visual TimeAnalyzer\manual_de.pdf 6644 PDF File
C:\Program Files\Visual TimeAnalyzer\manual_en.dat 89716 DAT File
C:\Program Files\Visual TimeAnalyzer\manual_en.pdf 26102 PDF File

Folder information Created after Installation:

Folder Location
C:\Documents and Settings\All Users\Start Menu\Programs\Visual TimeAnalyzer
C:\Program Files\Visual TimeAnalyzer

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_CURRENT_USER \Software\Neuber GbR\Visual TimeAnalyzer [NULL]0
HKEY_CURRENT_USER \Software\Neuber GbR\Visual TimeAnalyzer\Options B2R0
HKEY_CURRENT_USER \Software\Neuber GbR\Visual TimeAnalyzer\Options [NULL]0