Hacktool.KeyLoggPro

Hacktool.KeyLoggPro

Updated:
13 February 2007
Version:
1.2
Publisher:
Panterasoft
Risk Impact:
High
File Names:
Not available
Systems Affected:
Windows

Behavior


Hacktool.KeyLoggPro keeps a log of keystrokes on the system and can run hidden from the user.

Symptoms


The presence of one or more files detected as Hacktool.KeyLoggPro.

Behavior


An executable file must be installed on the system.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 01 February 2015 revision 020
  • Initial Daily Certified version 20 May 2003
  • Latest Daily Certified version 26 January 2015 revision 023
  • Initial Weekly Certified release date 22 May 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Hacktool.KeyLoggPro is a hacktool used to monitor keystrokes on the computer. The keystrokes are saved locally in a log file on the system. This hacktool does not contain functionality to remotely access the log files.

When the file is installed on the system, it will add a registry key at the location:

HKEY_CURRENT_USER\.Default\Software\Microsoft\Windows\CurrentVersion\Run

This action will cause Hacktool.KeyLoggPro to be loaded as the system is started.

These procedures pertain to all current and recent Symantec security products, including the Symantec Antivirus and Norton Antivirus product lines. Symantec Security Response has tested all the virus definitions for quality assurance.
  1. Update the virus definitions.
  2. Run a full system scan and write down the filenames of all the files detected as Hacktool.KeyLoggPro.
  3. Delete the value that was added to the registry.
  4. Restart the system.
  5. Run a full system scan and delete all the files detected as Hacktool.KeyLoggPro.

1. Updating the virus definitions
If your computer shows symptoms of this program, update your virus definitions.

There are two ways to obtain the most recent virus definitions:
  • Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
  • Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

    The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.

2. Scanning for and recording the filenames
This procedure runs a full system scan and deletes all the files detected as Hacktool.KeyLoggPro.
  1. Start your Symantec antivirus software and make sure that it is configured to scan all the files:
    • For Norton AntiVirus Consumer products, refer to "How to configure Norton AntiVirus to scan all files."
    • For Symantec AntiVirus Enterprise products, refer to "How to verify a Symantec AntiVirus Corporate product is set to scan all files."
  2. Run a full system scan.
  3. If the scan detects any files as Hacktool.KeyLoggPro, write down the filenames.

3. Deleting the value from the registry
CAUTION : Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.
  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit, and then click OK. (The Registry Editor opens.)
  3. Navigate to the key:

    HKEY_CURRENT_USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  4. In the right pane, find an entry that corresponds to one of the filenames written down in step 2.
  5. Exit the Registry Editor.

4. Restarting the computer
5. Scanning for and deleting all the files recorded in step 2