Ghost Keylogger can only run under administrator

Posted on 2006-05-10
Last Modified: 2010-04-11
I have ghost keylogger and it works fine under administrator but i cant run the config file from a user acct though the user acct is administrator and there is no password setup...

In safe mode i go to the administrator acct which has no password and can run the keylogger...
Ive setup a password thinking that i could log in on a the user acct and use the "run as"  with administrator and password to run the program....
In safe mode ive right clicked on the folder and set all full writes to the folder for the user.....

the message i get is the admin password cannot be and/or no permissions are set to run the program
Question by:frogglegs
    LVL 2

    Accepted Solution

    I am not familiar with that program but you SHOULD be able to make anything run under a normal user context with a bit of effort.

    When toubleshooting this type of problem I like to use REGMON and FILEMON which are free from

    You basically use these utilities to monitor your registry and filesystem in REALTIME while you launch the app. You then can filter the real time capture to locate the exact files and reg entries that your NORMAL user cannot open or modify.

    You then just change the permissions on the individual files and reg keys until the app runs.

    Sometimes this process is cumbersome sometimes it's as easy as changing the permission on on dll.

    You can then create and export a security template of this new configuration to a text file with Windows Security Configuration and Analysys and deploy this setting to other workstations.

    Best of luck and happy keylogging!
    LVL 2

    Expert Comment

    you might just try installing the program as that user if you know the password. the program is probably trying to access user config reg settings of the account that installed the keylogger.
    LVL 1

    Expert Comment

    try 'perfect keylogger'
    it installs on one account and runs fien on them all.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now