![]() The tests were ran on a clean Windows 7 Ultimate 32-bit by installing or activating the keylogger and typing a few sentences. 5 of them are Remote Administration Trojans (RAT) with keylogging functionality and the remaining 8 are pure keylogging programs where 3 of them Elite Keylogger, Invisible Keylogger Stealth & Keylogger Pro 2012 use low level keyboard hooking. We tested the keystroke encryption software with a total of 13 well known keyloggers that are widely being used today. Do take note that the uninstaller does not prompt for password when the program is protected with a password.ĭelete UpperFilters: Keyboard stops working and notifies about a failure in connecting to driver with an advice to restart your computer or reinstall. Silent Uninstall: YES with the command line parameter /VERYSILENT (uses Inno Setup) but not fully automated because it prompts a survey window that cannot be suppressed. Has an option to keep protection active when process is terminated but didn’t work for us. KeyScrambler installer uses Nullsoft Scriptable Install System (NSIS) and supports the silent uninstall switch /S.ĭelete UpperFilters: Keyboard stops working. Failed to auto repair even when logged in as an administrator with UAC turned off. Program detects the problem when Windows is booted up and offers to automatically repair by rebooting the computer. Installer uses Inno Setup and can be silently uninstalled with the command line “unins000.exe /VERYSILENT”ĭelete UpperFilters: FAILED. Protection is still active when the process is terminated. Memory Usage: Starts at 1.8MB and increases a bit on every keystroke The ID can be found in the registry HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.ĭelete UpperFilters: FAILED. Can be silently uninstalled using this command line “msiexec.exe /x ( /q”. Finally, the memory and CPU usage are also measured to see how heavy they are on system resources. The UpperFilter registry key for the keyboard will also be deleted to determine if they are able to detect and recover automatically. In this series of basic tests, we will attempt to tamper with the application by terminating its process to see if the protection is still active, and uninstall silently without the user noticing it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |