snapter
15-11-2007, 10:41 PM
http://img526.imageshack.us/img526/80/invasionadbyprotocolmi5.jpg
Developers: British_Intel AKA Andy & Protocol AKA Wez
Lang: Visual BASIC 6
Package Size: 1.67 mb
Compatibility: Windows 95 /98/Me/NT/2000/XP
Last Released Version: V1.01
Description:
Invasion Remote Admin Tool is to powerful tool which will allow you to remotely control computers that have routers by using WITHOUT (To review connection), to connect to client on to listening port that you have Seth up.
Features:
Case out to manager, you case out to transfer, cases out scripting, process to manager, webcam to manager, screen captures, registry publisher, Windows to manager, misc info, online key to logger, cases out transfers, Plugins etc etc.
http://www.megasecurity.org/trojans/i/invasion/ImagesP/Invasion1.01.gif
http://www.megasecurity.org/trojans/i/invasion/ImagesP/Invasion1.01_es.gif
Server:
dropped file:
c:\WINDOWS\system32\server.exe
size: 102,468 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Start"
data: C:\WINDOWS\System32\server.exe
**Hidden Content: Check the thread to see hidden data.**
Developers: British_Intel AKA Andy & Protocol AKA Wez
Lang: Visual BASIC 6
Package Size: 1.67 mb
Compatibility: Windows 95 /98/Me/NT/2000/XP
Last Released Version: V1.01
Description:
Invasion Remote Admin Tool is to powerful tool which will allow you to remotely control computers that have routers by using WITHOUT (To review connection), to connect to client on to listening port that you have Seth up.
Features:
Case out to manager, you case out to transfer, cases out scripting, process to manager, webcam to manager, screen captures, registry publisher, Windows to manager, misc info, online key to logger, cases out transfers, Plugins etc etc.
http://www.megasecurity.org/trojans/i/invasion/ImagesP/Invasion1.01.gif
http://www.megasecurity.org/trojans/i/invasion/ImagesP/Invasion1.01_es.gif
Server:
dropped file:
c:\WINDOWS\system32\server.exe
size: 102,468 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Start"
data: C:\WINDOWS\System32\server.exe
**Hidden Content: Check the thread to see hidden data.**