Keylogger.Revealer Description

Type: Keyloggers

Keylogger.Revealer is a detection name used by cybersecurity vendors in reference to the Revealer program by Logixoft that has an official page on The Keylogger.Revealer software is proposed to companies and concerned parents as a monitoring tool, which can help securing important files and help you keep tabs on your children's online activity. Many cybersecurity experts have spoken well of Revealer by Logixoft but you should take into consideration that Black Hat hackers may abuse the application. The Keylogger.Revealer program is available as a free download that supports the following functionality:

  • Prevents someone else from opening the program.
  • Records text, passwords, and conversations.

The developers of Keylogger.Revealer claim that their program recognizes IM clients, Internet browsers, and other types of apps where the user credentials and simple text is received as input. The complete Revealer suite can be paid for with a one-time payment of 39,99 EUR, which grants the keylogger operator the right to install the app on one machine. Parents and company management may be interested in buying the 'Family' and 'Business' packages, which allow you to install the Keylogger.Revealer on three to five computers. Additionally, Revealer PRO users receive access to the following advanced capabilities of the software:

  • Hides in Task Manager, at startup and on the drive.
  • Takes screenshots of the desktop or active window.
  • Log files via email, Dropbox and FTP or the Local Network.

Experts recommend you read the Privacy Policy published on before you decide to use the Keylogger.Revealer software. Monitoring tools like Revealer from Logixoft are deemed as legitimate programs, but they are easy to abuse. If you find Keylogger.Revealer on your home PC and you have not installed it yourself, chances are that a third-party might have recorded your activity on the device. Hence, it is a good idea to change your passwords for all your online accounts. PC users who suspect their system is compromised by a corrupted copy of Keylogger.Revealer should use a trusted anti-malware solution to clean their systems.


11 security vendors flagged this file as malicious.

Anti-Virus Software Detection
Sunbelt Revealer Free Edition
Panda Trj/Keylog.LH
Ikarus not-a-virus:Monitor.Win32.RevealerKeylogger.b
Fortinet Keylog/RevealerKeylogger
F-Secure Monitor.Win32.RevealerKeylogger.b
eWido Not-A-Virus.Monitor.Win32.RevealerKeylogger.b
ClamAV Trojan.Keylogger-209
BitDefender Application.Keylogger.Revealer.1.2
AVG Logger.CYJ
Avast Win32:Adware-gen
AntiVir SPR/RevealerKeylogger.B.1

Technical Information

Screenshots & Other Imagery

SpyHunter Detects & Remove Keylogger.Revealer

File System Details

Keylogger.Revealer creates the following file(s):
# File Name MD5 Detection Count
1 rvlkl.lnk 21edee5f0806469524f98667af280e56 83
2 rvlkl.exe c90846e860f7766d84814d7707b06149 3
3 file.exe 6e6c73f87952f9fa6ae12ebfd5c74071 0
More files

Registry Details

Keylogger.Revealer creates the following registry entry or registry entries:
%ALLUSERSPROFILE%\Application Data\rvlkl
Regexp file mask
%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\rvlkl.lnk

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.