Please note, if you want to make a deal with this user, that it is blocked.
Hi i am s0lid . I am Formerly Known as Corpse to many people here . My trojan name is A-311 Death Dangerous . If some one is infected with my trojan they have to just leave that computer . You will gain access to their PC completely . You will get Access to Registry , Play Movies Song's , Open and Close Disc's and many other things like Shutting them down . It has an option to Shut it down Permanently . All you need is an Infected PC with this Trojan and you can just play with them . Visit my site to buy this Trojan . Just like ZeUs and other Banking trojan's . You can not only get Access to their PC u will get thier log's . Play with your Enemies with this Trojan .
Visit my site . Register there and Enjoy your Stay there . Forum will be Updated soon .
You can do these action's with my Trojan
• Add/Delete registry keys/values
• Close the connection
• Copy/Delete clipboard data
• Create a snapshot of the desktop
• Create directory
• Create a file
• Delete a file
• Disable the floppy disk drive
• Execute a file
• Find file
• Get local drive info
• Get/Set machine's time
• Get/Set mouse double-click interval time
• Get/Set mouse pointer location
• Hide processes
• Hide/Disable/Enable the system clock, Start button, system tray and the Desktop
• Key-logging
• Kill process
• Kill processes
• Logs off the infected user
• Modify Internet Explorer's settings (e.g. Default Search Page, Start Page, Home Page)
• Move a file
• Open/Close the CD-Rom tray
• Play a sound file
• Remove the backdoor service
• Send e-mail
• Swap the mouse buttons
• Update the malware from the hacker's specified site
More and More you can do with it . No Trojan has these many Option's
Please Contact me on MSN at [email protected] (or) [email protected] and ICQ at 593-837-410
Admin or Moderator Please Verufy My service contact me on MSN or ICQ
Visit my site . Register there and Enjoy your Stay there . Forum will be Updated soon .
You can do these action's with my Trojan
• Add/Delete registry keys/values
• Close the connection
• Copy/Delete clipboard data
• Create a snapshot of the desktop
• Create directory
• Create a file
• Delete a file
• Disable the floppy disk drive
• Execute a file
• Find file
• Get local drive info
• Get/Set machine's time
• Get/Set mouse double-click interval time
• Get/Set mouse pointer location
• Hide processes
• Hide/Disable/Enable the system clock, Start button, system tray and the Desktop
• Key-logging
• Kill process
• Kill processes
• Logs off the infected user
• Modify Internet Explorer's settings (e.g. Default Search Page, Start Page, Home Page)
• Move a file
• Open/Close the CD-Rom tray
• Play a sound file
• Remove the backdoor service
• Send e-mail
• Swap the mouse buttons
• Update the malware from the hacker's specified site
More and More you can do with it . No Trojan has these many Option's
Please Contact me on MSN at [email protected] (or) [email protected] and ICQ at 593-837-410
Admin or Moderator Please Verufy My service contact me on MSN or ICQ
Last edited: