Emsisoft Anti-Malware question

Status
Not open for further replies.
R

rocky

Thread author
I have Emsisoft Anti-Malware installed as only security program with windows firewall on win.7 x86. Out of curiosity I tried to run Zemana keylogger simulator and it ran with no reaction from Emsisoft Anti-Malware so now I'm not sure what to think. I have fallen into a hole and I can't really find a program I'm having alot of faith in.
 

hamo

Level 10
Verified
Well-known
Mar 30, 2014
468
Emsisoft full Compatible with Zemana AntiLogger ( no reaction )

PImzvUmE.png


You can use Zemana AntiLogger seamlessly as an important extra layer of security, in harmony with almost any antivirus or firewall software.


See the list here : http://www.zemana.com/product/antilogger/overview/

Press

 
  • Like
Reactions: marg and rocky

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
I think most antiviruses/antimalwares, if not all, white-listed Zemana's keylogger simulation test. So, don't lose faith if your antivirus/antimalware for not detecting and stopping the keylogger test.

I have ESET, but it doesn't block Zemana's simulation tests. Kaspersky doesn't block them either. :)
 
D

Deleted member 178

Thread author
ZAL is whitelisted by most of Avs, if you want test it, maybe you can set EAM on paranoid
 
  • Like
Reactions: rocky and XhenEd
R

rocky

Thread author
Thanks for the replies. I will install Zemana and give that a try. I appreciate the help!
 
R

rocky

Thread author
I decided to give SpyShelter a try since I had never used it. It does block Zemana keylogger test. Thanks again for all the help!
 

Fabian Wosar

From Emsisoft
Verified
Developer
Well-known
Jun 29, 2014
260
Out of curiosity I tried to run Zemana keylogger simulator and it ran with no reaction from Emsisoft Anti-Malware so now I'm not sure what to think. I have fallen into a hole and I can't really find a program I'm having alot of faith in.
Emsisoft Anti-Malware is very focused on behavior blocking. Behavior blockers in general can't be tested with leak tests like the Zemana test for example. You could even argue that a detection of such tools by a behavior blocker is a false positive. While HIPS only care about whether or not a certain API was called or a certain action took place, behavior blockers care a lot about the circumstances and combinations of events.

From a behavior blocker's point of view the Zemana leak test is nothing like an actual keyloggers. To name just a few things:
  1. A keylogger is usually invisible to the user. It doesn't have any GUI or a tray icon. The Zemana leak test though does have a GUI to display what was logged.
  2. Keyloggers also usually install themselves in the system and make sure they run automatically during boot. This leak test on the other hand is just started by the user. It doesn't install itself and never adds itself to the autoruns.
  3. Just collecting what you type alone is not very useful. Keyloggers always have mechanisms that allow them to save what you typed or to send out what you typed through the network. Leak tests usually don't do that.
  4. Keylogger executables often "look" fishy. No icons, no version information, no digital signatures, usage of obfuscators and packers. Leak test executables on the other hand usually have a nice shiny icon, have proper version information and some leak test providers even signed their leak test.
So when a behavior blocker sees the Zemana leak test call the SetWindowsHookEx API for example to install a window message hook it will notice that the application has the capability of logging keys, but all other aspects of the application point toward it being legitimate and not a keylogger, so it may decide not to issue an alert about it just yet.
 
D

Deleted member 21043

Thread author
Emsisoft Anti-Malware is very focused on behavior blocking. Behavior blockers in general can't be tested with leak tests like the Zemana test for example. You could even argue that a detection of such tools by a behavior blocker is a false positive. While HIPS only care about whether or not a certain API was called or a certain action took place, behavior blockers care a lot about the circumstances and combinations of events.

From a behavior blocker's point of view the Zemana leak test is nothing like an actual keyloggers. To name just a few things:
  1. A keylogger is usually invisible to the user. It doesn't have any GUI or a tray icon. The Zemana leak test though does have a GUI to display what was logged.
  2. Keyloggers also usually install themselves in the system and make sure they run automatically during boot. This leak test on the other hand is just started by the user. It doesn't install itself and never adds itself to the autoruns.
  3. Just collecting what you type alone is not very useful. Keyloggers always have mechanisms that allow them to save what you typed or to send out what you typed through the network. Leak tests usually don't do that.
  4. Keylogger executables often "look" fishy. No icons, no version information, no digital signatures, usage of obfuscators and packers. Leak test executables on the other hand usually have a nice shiny icon, have proper version information and some leak test providers even signed their leak test.
So when a behavior blocker sees the Zemana leak test call the SetWindowsHookEx API for example to install a window message hook it will notice that the application has the capability of logging keys, but all other aspects of the application point toward it being legitimate and not a keylogger, so it may decide not to issue an alert about it just yet.
Your behavior blocker is amazing. I wish I could make one like yours aha :D Of course that isn't going to happen with me using .NET... Of course I will need C...
 

Tony Cole

Level 27
Verified
May 11, 2014
1,639
Fabian thanks for the reply! It's truly an amazing product; that offers excellent protection.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top