Severity scale  

SC-Keylog. How to Remove? (Uninstall Guide)

removal by - -   | Type: Keyloggers
From the publisher:
'SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile.

Use this tool to: Find out what is happening on your computer while you are away, to maintain a backup of your typed data automatically, to spy on others or use it for monitoring your kids.

SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as many keylogger engines as you like and deploy them on remote systems with ease. An optional mailing feature allows you to automatically send the logfile to a specified email address on a user defined interval.'
'SC-KeyLog logs all keyboard activity to a file. Every single typed character and control button can be logged. It can be used to monitor your productivity or to spy on others. SC-KeyLog can also log the names of the programs used and the date and time of entered characters. Average users won't notice SC-Keylog's presence. SC-KeyLog offers e-mail functionality for remote monitoring of a computer. Key features of SC-KeyLog 2: Easy remote deployment Does not affect system performance in any way Extensive activity logging SC-KeyLog records all keyboard activity, button mouseclicks, local ip-addresses, usernames and IE favorites Automatically e-mail activity logs periodically Invisible The SC-KeyLog is not visible in the Win9X task manager, task tray, has no windows, does not use hard codes filenames or registry entries, needs almost no memory and diskspace and takes almost no performance. Access to the keylogger is password protected and is only possible with the SC-KeyLog Control Panel included in the package Size The actual keylogger engine that can be submitted to a target machine is less than 40 KB! the engine does not need any runtime libraries or other components to be transferred to the machine like VB or whatsoever ' Related files: kl.dll, uninstall sc-keylog 2.lnk, unwise.ini

SC-Keylog properties:
• Sends out logs by FTP or email
• Logs keystrokes
• Hides from the user
• Stays resident in background

It might be that we are affiliated with any of our recommended products. Full disclosure can be found in our Agreement of Use. By downloading any of provided Anti-spyware software you agree with our Privacy Policy and Agreement of Use.
Do it now!
Reimage - remover Happiness
Compatible with Microsoft Windows
What to do if failed?
If you failed to remove infection using Reimage Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall SC-Keylog. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Reimage is recommended to uninstall SC-Keylog. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.
Not using OS X? Download a remover for Windows.
Press Mentions on Reimage
Alternate Software
Alternate Software
We are testing Plumbytes's efficiency (2012-03-25 00:20)
Malwarebytes Anti Malware
We are testing Malwarebytes Anti Malware's efficiency (2012-03-25 00:20)
Hitman Pro
Webroot SecureAnywhere AntiVirus

SC-Keylog manual removal

Kill processes:
sc-keylog2.exe, unwise.exe, sc-kl.exe
Delete registry values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\sc-keylog 2.22
HKEY_LOCAL_MACHINE\software\wise solutions\wise installation system\repair\c:/program files/soft-central/sc-keylog/install.log\icons\1\workingdir
Unregister DLLs:

Delete files:
install.log, khclkcs.dat, kl.dll, klena, kllna, klrma, sc-keylog 2 help.lnk,
sc-keylog .lnk, uninstall sc-keylog 2.lnk, sc-keylog2.chm, sc-keylog2.exe, unwise.exe, unwise.ini, sc-kl.exe
Delete directories:
[profile]\start menu\programs\soft-central sc-keylog
[program files]\soft-central\sc-keylog

Geolocation of SC-Keylog

Map reveals the prevalence of SC-Keylog. Countries and regions that have been affected the most are: Vietnam.

Information updated:

Comments on SC-Keylog

Some time before, I really needed to buy a building for my business but I did not have enough money and could not buy something. Thank God my mate suggested to try to get the personal loans at reliable creditors. Thus, I did that and used to be happy with my secured loan.
Thanks alot - your answer solved all my problems after several days stugrlging
i have this sc-kelogger on my computer, i urgently need help in removelying it, i have tried the above steps, but it is still in my computer, looking for an easy program that specifically targets the keylogger
BackWeb is software that auto updates your computer. Many computer manufacturers legitimately use this software to connect to your computer and retrieve NON-personal data which they use to make sure your system is up to date. There are two different versions of BackWeb. BackWeb Light does not come bundled with OEM computers. The Light version will generate pop-ups and may install unknown software without your auithorization. If BackWeb is installed for a known purpose, we recommend that you do not remove it.

What is this? Mine says Back Web Light. Should I remove them. I can' t understand what I am seeing. "Backweb Lite" then numbers then where then registry. What does this mean? Is this where when I type something the computer records those key strokes and when I start to type the first letter it brings up a window for me to click on that "name"? If so, how do I remove it?
Guess What
Hey i use it for hacking habbo hotel it works smtp server is the server hotmail server is
This thing is good for personal use, but when a friend sneeks on to your computer from safe mode, installs it and then gets your secrets and passwords that is when is becomes bad.
'Easy remote deployment' : reads like 'illegal hacker tool' to me.

Post a comment

Attention: Use this form only if you have additional information about a parasite, its removal instructions, additional resources or behavior. By clicking "post comment" button you agree not to post any copyrighted, unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, profane, hateful, racially, ethnically or otherwise objectionable material of any kind.

Home page Name


(All fields are required)