|Detected||Apr 26 2012 15:30 GMT|
|Released||Apr 26 2012 17:56 GMT|
If you’d like to find out more about how programs of this type function, please read about the general behavior of programs in the same class or sub-class (see right).
Because many programs of this type are slight modifications of older versions, the descriptions for these older versions may be of interest. Links to any available descriptions are displayed under the general description on the right of the screen.
If you can’t find a suitable description on our site, you can get more help from the Contact Us section.
Trojan-Spy programs are used to spy on a user’s actions (to track data entered by keyboard, make screen shots, retrieve a list of running applications, etc.) The harvested information is then transmitted to the malicious user controlling the Trojan. Email, FTP, the web (including data in a request) and other methods can be used to transmit the data.