Click on screenshot to zoom
Danger level 6
Type: Keyloggers
Common infection symptoms:
  • Installs itself without permissions
  • Connects to the internet without permission


SC-KeyLog is the latest Keylogger one needs to be aware of.
SC-KeyLog may attempt to compromise the infected computer system, and could - amongst many other dubious tactics - attempt to deliver various advertisements to the users' system.

Being a powerful, invisible Keylogger, SC-KeyLog tends to capture user activity and save it to an encrypted log file.

According to its manufacturers, “SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom Keylogger engines of only 40 KB in size! SC-KeyLog is a commercial Keylogger designed for ‘responsible parents, concerned lovers, dedicated managers, and curious husbands and wives.’

One needs to be aware of the fact that SC-KeyLog tracks every keystroke typed, which translates into being able to read a user’s emails, online chats, and see what sites they have been visiting. SC-KeyLog may have been installed for legitimate reasons, however it is also highly possible for SC-KeyLog to steal the computer users’ username and passwords and track their Internet activity.

SC-KeyLog is thus further be classified as a PUP (Potentially Unwanted Program).

A Potentially Dangerous Tool (also known as a PUP) is an application that is not harmful in its design, the only time this type of tool will become a PC threat is if deployed by unauthorized parties, for potentially malicious intent.

SC-KeyLog is further given the classification as a low risk application, which generally speaking should do no harm to a computer system, unless installed without the knowledge or permission from the system’s user.

Being a low risk program, SC-KeyLog may track online habits - as provided for in a privacy policy or End User License Agreement (EULA) - or may display advertising within the applications themselves, these programs have only vague, minimal or negligible effects on the system’s privacy.

It has been claimed that if SC-KeyLog allows for the unauthorized access to an infected PC, then SC-KeyLog will then have capability to spread over a network exploiting various Windows vulnerabilities.

SC-KeyLog may come bundled with other malware and ensure that they are executed each time Windows starts. A malicious Trojan horse or Bot may represent a higher security risk for the compromised system and/or its network environment.

The best thing to do to rid any computer system of the presence of SC-KeyLog and all its components, would be to employ the services of a fully functional and up to date, not to mention legitimate antispyware tool.

Download Spyware Removal Tool to Remove* SC-KeyLog
  • Quick & tested solution for SC-KeyLog removal.
  • 100% Free Scan for Windows

How to manually remove SC-KeyLog

Files associated with SC-KeyLog infection:


SC-KeyLog DLL's to remove:


SC-KeyLog processes to kill:


Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.