Elite.Keylogger virus description
Technical details:
Categories: Spyware
Elite.Keylogger Folders:
[%PROGRAMS%]\WideStep Elite Keylogger 3.0
[%PROGRAM_FILES%]\widestep software\elite keylogger
Elite.Keylogger Files:
[%WINDOWS%]\help\ek_manual.chm
[%PROGRAMS%]\widestep elite keylogger 2.6\uninstall.lnk
[%PROGRAMS%]\widestep elite keylogger 2.6\view logs.lnk
[%SYSTEM%]\atmadsvr.exe
[%SYSTEM%]\drivers\atinnt.sys
[%SYSTEM%]\drivers\atinx2k.sys
[%SYSTEM%]\drivers\raspex.sys
[%SYSTEM%]\mscache.sys
[%SYSTEM%]\sto32.dll
[%WINDOWS%]\help\ek_manual.chm
[%PROGRAMS%]\widestep elite keylogger 2.6\uninstall.lnk
[%PROGRAMS%]\widestep elite keylogger 2.6\view logs.lnk
[%SYSTEM%]\atmadsvr.exe
[%SYSTEM%]\drivers\atinnt.sys
[%SYSTEM%]\drivers\atinx2k.sys
[%SYSTEM%]\drivers\raspex.sys
[%SYSTEM%]\mscache.sys
[%SYSTEM%]\sto32.dll
Elite.Keylogger Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0a252b94-2fcd-bbf8-8add-aa019f83938e}
HKEY_CLASSES_ROOT\clsid\{333bd105-16d3-4169-b3c3-5090a69d691f}
HKEY_CLASSES_ROOT\clsid\{60322fda-45da-bfb6-e0ca-ae4ff59497c0}
HKEY_LOCAL_MACHINE\software\widestep\elitekeylogger
HKEY_LOCAL_MACHINE\system\controlset001\services\tdiip
HKEY_LOCAL_MACHINE\system\controlset001\services\usbkbd
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\atinnt
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\atinx2k
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\raspex
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tdiip
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\usbkbd
Elite.Keylogger Registry Values:
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
Elite.Keylogger indications of infection
This symptoms of Elite.Keylogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy
Exterminate-It antivirus software and perform a full scan of the computer.
You can also
Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
EUniverse.variant Hijacker Cleaner
Ehg.sonyny.hitbox Tracking Cookie Removal
Pigeon.EQL Trojan Information
Galore Trojan Removal instruction
Active.Key.Logger Spyware Information