Technical details:
Categories: Spyware
Perfect.Keylogger.Lite Folders:
[%PROGRAM_FILES%]\perfect keylogger lite
Perfect.Keylogger.Lite Files:
[%WINDOWS%]\WinXp\bpk.chm
[%WINDOWS%]\WinXp\bpk.chm
Perfect.Keylogger.Lite Registry Values:
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
Perfect.Keylogger.Lite indications of infection
This symptoms of Perfect.Keylogger.Lite detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove Vxidl.BBE Trojan
Pigeon.AVFU Trojan Removal
Deception Trojan Symptoms
Removing Kalah Trojan
Remove unicast.com Tracking Cookie
No comments:
Post a Comment