Keylogger.Revealer DescriptionType: Keyloggers
Keylogger.Revealer is a detection name used by cybersecurity vendors in reference to the Revealer program by Logixoft that has an official page on Logixoft.com. The Keylogger.Revealer software is proposed to companies and concerned parents as a monitoring tool, which can help securing important files and help you keep tabs on your children's online activity. Many cybersecurity experts have spoken well of Revealer by Logixoft but you should take into consideration that Black Hat hackers may abuse the application. The Keylogger.Revealer program is available as a free download that supports the following functionality:
- Prevents someone else from opening the program.
- Records text, passwords, and conversations.
The developers of Keylogger.Revealer claim that their program recognizes IM clients, Internet browsers, and other types of apps where the user credentials and simple text is received as input. The complete Revealer suite can be paid for with a one-time payment of 39,99 EUR, which grants the keylogger operator the right to install the app on one machine. Parents and company management may be interested in buying the 'Family' and 'Business' packages, which allow you to install the Keylogger.Revealer on three to five computers. Additionally, Revealer PRO users receive access to the following advanced capabilities of the software:
- Hides in Task Manager, at startup and on the drive.
- Takes screenshots of the desktop or active window.
- Log files via email, Dropbox and FTP or the Local Network.
11 security vendors flagged this file as malicious.
Screenshots & Other Imagery
SpyHunter Detects & Remove Keylogger.Revealer
File System Details
|#||File Name||MD5||Detection Count|
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.