Spyware.Keylogger

detection icon

How to remove a Keylogger

Spyware.Keylogger is Malwarebytes’ generic detection name for applications that can harvest keystrokes, screenshots, network activity, and other information from systems where it is installed. This spyware may covertly monitor user behaviour and harvest personally identifiable information (PII), including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity.It may also covertly collect screenshots, video recordings, or activate any connected camera or microphone. Collected information may be stored locally and later retrieved, or may be transmitted to an online service or location.

Keylogger Symptoms

Spyware.Keylogger may run as a start-up entry and may be visible as running processes on compromised machines. Alternatively, it may also be configured in a manner which prevents visible processes and start-up entries

Types of Keyloggers

Spyware.Keylogger may be distributed using various methods. This spyware may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, it may be installed by an individual with physical or remote access to the computer. Spyware.Keylogger may be installed with or without user consent.

Keylogger Protection

block Spyware.KeyLogger

Malwarebytes blocks Spyware.KeyLogger

How to remove Keyloggers

Malwarebytes can detect and remove many Spyware.Keylogger infections without further user interaction.

  1. Please download Malwarebytesto your desktop.
  2. Double-click MBSetup.exeand follow the prompts to install the program.
  3. When your Malwarebytes for Windowsinstallation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantineto remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Business remediation

How to remove Spyware.Keylogger with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menu

Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections pageto see which threats were found.

Nebula detections

On the Quarantine pageyou can see which threats were quarantined and restore them if necessary.

Nebula Quarantaine