A client has asked you to install a keylogger on several target systems in order to see if their anti-malware software can detect the software used. You have decided to deploy a keylogger that can be sent via e-mail and utilizes executables and registry entries that can be renamed to provide some level of stealth. What keylogger should you use?