Click on screenshot to zoom
Danger level 9
Type: Trojans
Common infection symptoms:
  • Connects to the internet without permission
  • Installs itself without permissions
  • Shows commercial adverts
  • Slow Computer
  • Slow internet connection
  • System crashes


Active since May of 2011, MonitoringTool:Win32/KeyloggerOnline, also known as
MonitoringTool:Win32/Powerspy.F and Riskware.Monitor.Win32.PowerSpy!IK, is a rootkit Trojan, which has been noticed to have attacked thousands of Windows systems. The infection can manage remote connection communications, perform distributed denial of service (DDoS) attacks, or even record personal information, which could be used in your disadvantage! Without a doubt, this Trojan is one of the most disturbing and dangerous infections, which could attack your Windows system, but it may be difficult to disclose it running in your computer. And it will not be easy to detect and remove MonitoringTool:Win32/KeyloggerOnline from a PC, because this application does not have a visible interface, and its malignant files are well hidden from being found and deleted by existing security guards.

It has been found out that MonitoringTool:Win32/KeyloggerOnline can spread through Windows Live Messenger application, and this feature can also help schemers collect your personal information. Alongside this infiltration source, there are many more channels, which could be used for Trojan’s invasion, which is why we advise you act carefully when surfing on the web, using illegal sites, or downloading pirated files. If not, service.exe and TMonitor.exe components will enter your operating Windows system, and the Trojan will be enabled to act uncontrollably, even having your Windows privileges removed one by one. Both of these executables are cloaked, so if you had any ideas of having MonitoringTool:Win32/KeyloggerOnline deleted manually, you should reconsider this, in case you have never faced cloaked infections before.

The dangerous service.exe is camouflaged behind the name of an original Microsoft component, which can control applications’ running, record your keyboard inputs, or even hide itself from any detection. This Trojan’s file adds infection’s processes to the systems boot up, reconfigures Windows Security Center settings, disables System Restore attribute, and removes some Firewall features to have unlimited connection to the Internet. MonitoringTool:Win32/KeyloggerOnline creators can implement this to record personal information with browser helper objects, download malicious programs or spread the infection via IM (instant messaging) channels. And TMonitor.exe, which authentically is an integral Sony Ericsson PC Companion’s element, enables service.exe to work unnoticed with its employed rootkit, which hides the malignant files from being deleted. Additionally, TMonitor.exe has enough power to record mouse and keyboard inputs, which could be dangerous to the security of your sensitive passwords and user names.

It may be difficult to detect and remove MonitoringTool:Win32/KeyloggerOnline from your Windows OS; nonetheless, the removal task must be completed right away, or your system could get infected more gravely, and your personal information could be used unlawfully! If you are not sure that this Trojan is controlling your system, look out for any computer changes, or better yet, install up-to-date security software, which will detect this infection rapidly. This implementation will also produce full-time protection to your system, which is what every Windows system should be appointed with.

Download Spyware Removal Tool to Remove* MonitoringTool:Win32/KeyloggerOnline
  • Quick & tested solution for MonitoringTool:Win32/KeyloggerOnline removal.
  • 100% Free Scan for Windows

How to manually remove MonitoringTool:Win32/KeyloggerOnline

Files associated with MonitoringTool:Win32/KeyloggerOnline infection:


MonitoringTool:Win32/KeyloggerOnline processes to kill:


Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.