Severity scale  
  (48/100)

Invisible Stealth Keylogger. How to Remove? (Uninstall Guide)

removal by - -   Also known as Invisible Keylogger | Type: Keyloggers
12

The publisher of Invisible Stealth Keylogger states that

Invisible Stealth Keylogger is an extremely useful auditing and security tool. It runs silently in the background, records all of the machine's keyboard activities into a binary log file. The binary log file can later be viewed via included ''datview.exe'' utility [...] Invisible KeyLogger Stealth for WindowsNT version 1.0 is the world's first keystroke recorder that can capture even NT's trusted logon (alt-ctrl-del logon). It runs silently in the background, records all of the NT machine's keyboard activities into a binary file. This binary file can later be viewed via the 'datview.exe' utility provided. The only file that is required for keystroke recording is the file ''iks.sys''. This file can be renamed to maximize stealth. The binary log file can also be renamed and be redirected to a different path. The primary purpose of this program is to provide network administrators with an effective means to monitor workstation usage in hostile environments. It is an equally effective tool for parental control, security audit and network penetration for the security professionals.

About Invisible Stealth Keylogger

The developers of this keylogger (which is also known as Invisible Keylogger) have released three versions of this keylogger: Invisible Stealth Keylogger 1.2d, Invisible Stealth Keylogger 2.0, Invisible Stealth Keylogger 2.1. Although the developers of this application claim that it is a very beneficial tool, you should also remember that it can be used not only for guiltless purposes. This program can also be used to collect private information about the PC user. Moreover, if someone installs this program to your PC, they might become able to see your credit card info, your passwords, and basically track every click that you perform on your keyboard. As a result, such stealth of personal information can lead to data leakage or even financial tear-off. Needless to say, no one wants to suffer because of the activity of hackers and data thieves.

Invisible Stealth Keylogger

How can Invisible Stealth Keylogger enter victim's computer?

Invisible Stealth Keylogger can infiltrate your computer if you:

  1. Tend to install freeware or shareware without paying attention to installation settings;
  2. Browse through unreliable websites and allow to install suspicious apps;
  3. Open e-mails from unknown senders and extract the e-mail attachments;

How to remove this keylogger?

You can remove Invisible Stealth Keylogger with a professional anti-malware program - Reimage. It can detect every malicious file and permanently eliminate it. You can also try to remove this program manually (we have provided removal instructions below), but this removal method is not as effective as the automatic one.

Invisible Stealth Keylogger properties:
• Takes and sends out screenshots of user activity
• Sends out logs by FTP or email
• Logs keystrokes
• Hides from the user
• Stays resident in background

It might be that we are affiliated with any of our recommended products. Full disclosure can be found in our Agreement of Use. By downloading any of provided Anti-spyware software you agree with our Privacy Policy and Agreement of Use.
Do it now!
Download
Reimage - remover Happiness
Guarantee
Compatible with Microsoft Windows
What to do if failed?
If you failed to remove infection using Reimage Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Invisible Stealth Keylogger. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Reimage is recommended to uninstall Invisible Stealth Keylogger. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Not using OS X? Download a remover for Windows.
Press Mentions on Reimage
Alternate Software
Alternate Software
Plumbytes
We are testing Plumbytes's efficiency (2015-05-30 07:25)
Malwarebytes Anti Malware
We are testing Malwarebytes Anti Malware's efficiency (2015-05-30 07:25)
Hitman Pro
Webroot SecureAnywhere AntiVirus

Invisible Stealth Keylogger manual removal

Kill processes:
datview.exe, iks2k20d.exe
Delete registry values:
HKEY_LOCAL_MACHINE\system\controlset001\enum\root\legacy_iks
HKEY_LOCAL_MACHINE\system\controlset001\services\iks
HKEY_LOCAL_MACHINE\system\controlset002\enum\root\legacy_iks
HKEY_LOCAL_MACHINE\system\controlset002\services\iks
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_iks
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\iks
Delete files:
log viewer for iks.lnk, datview.exe, iks2k20d.exe, iks.dat, iks.sys, uninst.isu
Delete directories:
iks

Information updated:

Comments on Invisible Stealth Keylogger

Post a comment

Attention: Use this form only if you have additional information about a parasite, its removal instructions, additional resources or behavior. By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind.

Home page Name



«

(All fields are required)