Malware

MonitoringTool:Win32/SCKeyLog (file analysis)

Malware Removal

The MonitoringTool:Win32/SCKeyLog is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What MonitoringTool:Win32/SCKeyLog virus can do?

  • Reads data out of its own binary image
  • Authenticode signature is invalid

How to determine MonitoringTool:Win32/SCKeyLog?


File Info:

name: 65F76F9D2E89DAA28647.mlw
path: /opt/CAPEv2/storage/binaries/9d60e8fafd84280061671dca0ca1b1354ed166667a9d10e64aeb1975f27370b4
crc32: 39510979
md5: 65f76f9d2e89daa286474706286e4408
sha1: ce2386facc39334b0747eca3c249e8aae50c2018
sha256: 9d60e8fafd84280061671dca0ca1b1354ed166667a9d10e64aeb1975f27370b4
sha512: 03ebfb462fc2e263622d95b83b50face6710a23d0ea269626825684e07dbc458a8a8a9f627a7f23c67fea080f73b54536ccf9c217f2fc47c7b694a00e0264b11
ssdeep: 768:O2brF8RVtDA7OxIp2zn2xysxjYJz3Yym+m2Vn80rTQtAwXlm:wfDA7Ni2PhYZ3C+Nh8pA+lm
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T144337C11F4D1C8B3C982447149878A116BBBFD31CABFA94357983A4F6F366D18B2A343
sha3_384: ae5f761fdc85d29652855444bd96f608e01fbb60df152931ba4d779c4a1537f2dde1257927b10f7029d08955938e832f
ep_bytes: 6a606870034100e882360000bf940000
timestamp: 2006-03-09 13:37:15

Version Info:

0: [No Data]

MonitoringTool:Win32/SCKeyLog also known as:

BkavW32.Common.329C7BB8
LionicTrojan.Win32.SCKeyLog.tok5
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Graftor.21406
ClamAVWin.Spyware.10334-2
FireEyeGen:Variant.Graftor.21406
Skyhighgeneric!bg.fka
McAfeegeneric!bg.fka
Cylanceunsafe
ZillyaTrojan.SCKeyLog.Win32.4407
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojanSpy:Win32/SCKeyLog.550e6af2
K7GWSpyware ( 0055e3db1 )
K7AntiVirusSpyware ( 0055e3db1 )
BitDefenderThetaGen:NN.ZexaF.36744.dqW@aWPSd2ii
VirITTrojan.Win32.Generic.WPP
SymantecSMG.Heur!gen
ESET-NOD32Win32/Spy.SCKeyLog.AP
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan-Spy.Win32.SCKeyLog.plj
BitDefenderGen:Variant.Graftor.21406
NANO-AntivirusTrojan.Win32.SCKeyLog.bhmfb
AvastWin32:SCKeylog-M [Trj]
TencentMalware.Win32.Gencirc.10b22a27
TACHYONTrojan-Spy/W32.SCKeyLog.50688
EmsisoftGen:Variant.Graftor.21406 (B)
F-SecureHeuristic.HEUR/AGEN.1346263
DrWebTrojan.SCKeyLog.44
VIPREGen:Variant.Graftor.21406
TrendMicroTROJ_FAM_00003f7.TOMA
SophosTroj/SCLog-AG
GDataGen:Variant.Graftor.21406
JiangminTrojanSpy.SCKeyLog.d
WebrootW32.Trojan.Gen
GoogleDetected
AviraHEUR/AGEN.1346263
Antiy-AVLTrojan[Spy]/Win32.SCKeyLog
Kingsoftmalware.kb.a.989
XcitiumTrojWare.Win32.Spy.SCKeyLog.AP@3tbh
ArcabitTrojan.Graftor.D539E
ViRobotTrojan.Win32.A.SCKeyLog.47616.A
ZoneAlarmTrojan-Spy.Win32.SCKeyLog.plj
MicrosoftMonitoringTool:Win32/SCKeyLog
VaristW32/Trojan.WUCT-1404
AhnLab-V3Trojan/Win32.SCKeyLog.C115976
VBA32BScope.TrojanSpy.SCKeyLog
ALYacGen:Variant.Graftor.21406
MAXmalware (ai score=100)
MalwarebytesGeneric.Malware/Suspicious
PandaTrj/SCKeylog.AC
TrendMicro-HouseCallTROJ_FAM_00003f7.TOMA
RisingWorm.Mail.Win32.Bagle.aa (CLASSIC)
YandexTrojan.GenAsa!CbMSrlQrp3E
IkarusMonitoringTool.Win32.SCKeyLog
MaxSecureTrojan.Malware.9647883.susgen
FortinetRiskware/KeyLogger
AVGWin32:SCKeylog-M [Trj]
DeepInstinctMALICIOUS

How to remove MonitoringTool:Win32/SCKeyLog?

MonitoringTool:Win32/SCKeyLog removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment