DP Trojan

DP Trojan Description

This RAT tool was designed to gain the intruder remote access to the infected machine and to collect vital user info, by logging his keystrokes in to a log file and sending this log to the intruder. The hacker infects his victim’s PC via the e-mail or File and Print Sharing with a “server” application. This application opens a default port and awaits commands from the attacker. The intruder communicates with the “server” via a “client” application on his PC. It originated in July 2000. The author is a hacker called Fire-Crow . A newer version was released in September 200

» Learn more about SpyHunter's Spyware Detection Tool
and steps to uninstall SpyHunter.


Generic Trojan-BOUNDARY [Panda]Trojan.Win32.Generic.125F2612 [Rising]Trojan.Win32.Agent!IK [Emsisoft]TR/BHO.DP.2 [AntiVir]Trojan.Siggen2.12424 [DrWeb]TrojWare.Win32.Agent.gimt [Comodo]Trojan.Generic.4928529 [BitDefender]Trojan.Win32.Agent.gimt [Kaspersky]TROJ_GEN.R47C2L9 [TrendMicro-HouseCall]W32/Suspicious_Gen2.FBPYJ [Norman]

More aliases (200)

DP Trojan Automatic Detection Tool (Recommended)

Is your PC infected with DP Trojan? To safely & quickly detect DP Trojan we highly recommend you run the malware scanner listed below.

DP Trojan

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
Posted: March 28, 2006 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading ... Loading ...
Threat Metric
Threat Level: 8/10
Detection Count: 110

Leave a Reply

What is 6 + 3 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)