Drat
A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. Originated in September 200
File System Modifications
- The following files were created in the system:
# File Name 1 [system 2 cbj.dll 3 drat setup util.exe 4 drat.exe 5 drat_comp.header 6 dratfile_gui.exe 7 drattheworldsultimatevirtualspy.doc 8 init_asm.bin 9 shell32.exe
Registry Modifications
- The following newly produced Registry Values are:
HKEY..\..\..\..{RegistryKeys}HKEY_CLASSES_ROOTauthidentauthidentkey
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.