Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

Spytector 1.2.2

Released 21 years ago. April 2005

Copyright © MegaSecurity

By BrutalByte


Informations
Author BrutalByte
Family Spytector
Category Information Stealer
Version Spytector 1.2.2
Released Date Apr 2005, 21 years ago.
Language Delphi, compressed with FSG
Additional Information
Server:
dropped files:
c:\WINDOWS\kbdxm.dll             Size: 36,352 bytes 
c:\WINDOWS\system32\kbdxm.exe    Size: 27,653 bytes 
c:\WINDOWS\system32\kbdxm.msd    Size: 145 bytes 

startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{45AE4011-AE03-A3CC-AA32-20B312E6015D} "StubPath"
data: C:\WINDOWS\System32\kbdxm.exe 



tested on Windows XP
April 16, 2005

Author Information / Description
Spytector is an advanced monitoring application, with never seen before features, easy
to use interface and extremely powerful functions. Spytector is tracking all the 
activities of PC users (visited websites, all the keystrokes, opened windows etc.) and it 
delivers the logs to you via Email or FTP. In the delivered logs are also included the 
Protected Storage passwords (Outlook, MSN etc.). Spytector is completely invisible on the 
user's desktop and cannot be seen in the task manager, it's injected into explorer.exe on 
the startup and whenever the log must be sent it will inject in the default browser or/and 
in the default emailer (for firewall bypass necessity).

Features:

 - FTP and Email log delivery
 - Keylogger filter (only specific sites/windows are tracked)
 - Clipboard support
 - Protected Storage passwords support
 - Injection in explorer.exe
 - Injection in default browser or/and default emailer when sending the logs (for FWB)
 - It works even on Guest account (2k, XP)
 - Both the small and large icon of the server can be changed (16x16 and 32x32, 256 colors icons)
 - Editable server name, log name, log size, ActiveX startup
 - Melting option
 - Message option
 - Option to disable System Restore
 - Option to uninstall the server after a specific number of sent logs
 - Good encryption for log and server settings
 - The server and the log time attributes will be identical with the system files

BrutalByte

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.