The following instructions have been created to help you to get rid of "Perfect Keylogger" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site.

Threat Details:

  • keylogger

The Perfect Keylogger often gets installed in a combination with several trojans. Often it is installed in the windows directory and so it is invisible to the user. The Perfect Keylogger records all keystrokes and tries to send them via internet.
Supposed Functionality:
"Do you want to know what your buddy or colleague is typing? Or perhaps you want to check up on your family members and know what they are doing on your computer? With Perfect Keylogger it is possible in just 2 minutes! This program runs on the installed computer, fully hidden from its users, and logs everything that is typed in a protected file.
This program runs on the installed computer, being fully hidden from its users, and logs in a protected file all users' typing that occurs.
Features list:
Can be fully hidden from the user and running permanently
Supports all Windows versions, including Windows XP
Sending log by e-mail in the hidden mode
Can be invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List
Log file is encrypted and can be protected with a password
Easy log viewing and management
Possibility to specify target applications "
Removal Instructions:


Please use Windows Explorer or another file manager of your choice to locate and delete these files.
  • The file at "<$SYSDIR>\cursorswb.dll".
  • The file at "<$SYSDIR>\cursors.exe".
  • The file at "<$SYSDIR>\cursorshk.dll".
  • The file at "<$SYSDIR>\cursorsr.exe".
  • The file at "<$SYSDIR>\inst.dat".
  • The file at "<$SYSDIR>\pk.bin".
Make sure you set your file manager to display hidden and system files. If Perfect Keylogger uses rootkit technologies, use our RootAlyzer or our Total Commander anti-rootkit plugins.
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D to remove them.

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
  1. Please read these instructions before requesting assistance,
  2. Then start your own thread in the Malware Removal Forum where a volunteer analyst will advise you as soon as available.