DP Trojan Description
This RAT tool was designed to gain the intruder remote access to the infected machine and to collect vital user info, by logging his keystrokes in to a log file and sending this log to the intruder. The hacker infects his victim’s PC via the e-mail or File and Print Sharing with a “server” application. This application opens a default port and awaits commands from the attacker. The intruder communicates with the “server” via a “client” application on his PC. It originated in July 2000. The author is a hacker called Fire-Crow . A newer version was released in September 200
Generic Trojan-BOUNDARY [Panda]Trojan.Win32.Generic.125F2612 [Rising]Trojan.Win32.Agent!IK [Emsisoft]TR/BHO.DP.2 [AntiVir]Trojan.Siggen2.12424 [DrWeb]TrojWare.Win32.Agent.gimt [Comodo]Trojan.Generic.4928529 [BitDefender]Trojan.Win32.Agent.gimt [Kaspersky]TROJ_GEN.R47C2L9 [TrendMicro-HouseCall]W32/Suspicious_Gen2.FBPYJ [Norman]
More aliases (200)
DP Trojan Automatic Detection Tool (Recommended)
Is your PC infected with DP Trojan? To safely & quickly detect DP Trojan, we highly recommend you run the malware scanner listed below.
Download SpyHunter's* Malware Scanner to detect DP Trojan What happens if DP Trojan does not let you open SpyHunter or blocks the Internet?
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
- The following files were created in the system:
Posted: March 28, 2006 | By SpywareRemove
Threat Level: 8/10
Rate this article:
Detection Count: 87