Archive A Reconstructed © MegaSecurity Database
Spytector 1.2.2
Released 21 years ago. April 2005
Copyright © MegaSecurity
By BrutalByte
Informations
| Author | BrutalByte |
| Family | Spytector |
| Category | Information Stealer |
| Version | Spytector 1.2.2 |
| Released Date | Apr 2005, 21 years ago. |
| Language | Delphi, compressed with FSG |
Additional Information
Server:
dropped files:
c:\WINDOWS\kbdxm.dll Size: 36,352 bytes
c:\WINDOWS\system32\kbdxm.exe Size: 27,653 bytes
c:\WINDOWS\system32\kbdxm.msd Size: 145 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{45AE4011-AE03-A3CC-AA32-20B312E6015D} "StubPath"
data: C:\WINDOWS\System32\kbdxm.exe
tested on Windows XP
April 16, 2005
Author Information / Description
Spytector is an advanced monitoring application, with never seen before features, easy
to use interface and extremely powerful functions. Spytector is tracking all the
activities of PC users (visited websites, all the keystrokes, opened windows etc.) and it
delivers the logs to you via Email or FTP. In the delivered logs are also included the
Protected Storage passwords (Outlook, MSN etc.). Spytector is completely invisible on the
user's desktop and cannot be seen in the task manager, it's injected into explorer.exe on
the startup and whenever the log must be sent it will inject in the default browser or/and
in the default emailer (for firewall bypass necessity).
Features:
- FTP and Email log delivery
- Keylogger filter (only specific sites/windows are tracked)
- Clipboard support
- Protected Storage passwords support
- Injection in explorer.exe
- Injection in default browser or/and default emailer when sending the logs (for FWB)
- It works even on Guest account (2k, XP)
- Both the small and large icon of the server can be changed (16x16 and 32x32, 256 colors icons)
- Editable server name, log name, log size, ActiveX startup
- Melting option
- Message option
- Option to disable System Restore
- Option to uninstall the server after a specific number of sent logs
- Good encryption for log and server settings
- The server and the log time attributes will be identical with the system files
BrutalByte
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.