This is a e-mail stealer. It logs e-mail addresses and sends them to a certain e-mail. This keylogger-trojan is one of several e-mail stealing loggers family.
The following files were created in the system:
This small trojan is always a dangerous tool in the hands of experienced hacker. F0replay Trojan usually gives a control over infected machine to someone, who owns this trojan. That person is able to change many settings on the infected computer; this may lead to dangerous effects, such as data loss and unstable computer working.
The following files were created in the system:
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...
This is a Remote Administration Tool that is used by hackers to control the victim's machine remotely. The possibilities of such application depend on the needs of the attacker. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions...
Keylogger is a simple application, that is used by hackers to steal information, such as passwords and usernames, from remote PCs. It secretly installs itself on your computer and logs all keystrokes in a file. Later the keylogger sends this file to hackers e-mail or FTP.
The following files were created in the system:
This keylogger is designed for stealing valuable information, such as passwords and personal e-mails. All keystrokes, done by user are logged and stored in your PC, and later they are sent to the attacker.
The following files were created in the system:
This is a non-commercial keylogger. It is often used by hackers to steal information, which is being typed by the user. The application logs your keystrokes and sends them to attacker.
The following files were created in the system:
A simple but effective hacker tool, used for stealing passwords and monitoring other PC activity, such as visited websites, written e-mails etc.
The following files were created in the system:
This trojan usually pretends being a NetStat utility. When a user runs this spyware, it gives access to the infected PC to the hacker. The hacker can perform many actions on the remote machine; all of these actions are a potent threat, because they may lead to serious data losses or computer instability.
The following files were created in the system:
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...
RemoteShut is a remote administration tool, but not a spyware. This legitimate utility allows the remote user to shutdown a PC running RemoteShut server component. It doesn't have any dangerous payload. However, hackers may use it for obvious malicious purposes, so it is recommended to remove RemoteShut from the computer, unless you really wish to use it.
Remote Viewport is a malicious RAT that gives the remote attacker unauthorized access to an infected PC. The spyware consists of client and server. The server runs on a compromised computer and takes screenshots of user activity. Remote Viewport uses files with random names, so it is quite difficult to detect.
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...
A Remote Administration Tool is a special kind of hacker malware, used for remote access and control of other people's PCs. The attacker infects the PC via the e-mail or File and Print Sharing. A "server" allows him to connect via a "client" on his own machine. The functions of a RAT may vary, depending on the needs of the hacker. Some RATs can't really harm your PC and the only purpose they were made for is hooliganism. But some versions can steal vital information, remove files and even...
This is a keylogging malware, used by hackers to steal valuable information from user. It secretly installs itself on your computer and logs every keystroke. After that, it sends the log file to attacker, so that he can study it, in order to find passwords etc.
The following files were created in the system:
This keylogger is a malware application, created for non commercial spyonage. It logs all keystrokes to a file, and sends it to hacker. Valuable information, such as passwords and usernames can be lost.
The following files were created in the system:
This is a non-commercial keylogger. It is often used by hackers to steal information, which is being typed by the user. The application logs your keystrokes and sends them to attacker. If not treated correctly, information loss is inevitable.
The following files were created in the system:
A simple but effective hacker tool, used for stealing passwords and monitoring other PC activity, such as visited websites, written e-mails etc. It logs all keystrokes and sends this log to hacker.
The following files were created in the system:
This trojan, which is very similar to a simple virus scanner by its appearance, is really dangerous for any computer. When the user enables its 'scanner', this spyware start deleting many files from the hard drive. Although many antiviral computers are able to recognize and remove this pest, it is still very dangerous because inexperienced users, who believe this is an antiviral computer, might install and run it by themselves.
The following files were created in the system:
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.