Doly Trojan details

  • Description

    From the doc: 'Doly Trojan is a program which allows you to control other people's computers by the Internet. This kind of program calls 'Backdoor Trojan'. Doly Trojan 1.35 includes 44 commands which allow you to do almost everything you want with the 'victim's' computer. 1 Connect: Connect to the victim's computer (You can connect to him only if he had installed the server) 2 Disconnect: Disconnect from the victim's computer 3 Port Scanner: Use this tool to scan IP Adresses to see if they are infected with Doly Trojan 4 Close client server: Close the Doly Trojan server (The server will be active again when the victim will restart his computer) 5 Remove client server: Remove the Doly Trojan server from the victim's computer (You wont be able to connect to him if he wont run the setup again) 6 Disable the double mouse's double click: Disable the victim's mouse's double click (He wont be able to open anything with his by his mouse) 7 Remove desktop backround: Remove the backround image from the victim's Desktop 8 Set system colors: Change the victim's system colors to Black 9 Hide teskbar: Hide the victim's taskbar (He wont see his open applications) 10 Show teskbar: Bring back the victim's taskbar 11 FBI Screen: This will show on the victim's screen a cool image that he wont be able to remove untill he will make reset 12 Mouse swape: Swape the victim's mouse left click to right click and the right click to the left click (Very annoying) 13 Mouse unswape: Bring back the victim's mouse clicks to the original condition 14 Disconnect: Disconnect the victim's computer from the Internet 15 Move mouse to max point: Move the victim's mouse pointer to the buttom right side of the screen 16 Change the tittle color to a random color: Change all the open applications titles to a different color every time you click on the button 17 Sleep: Make the victim's computer go to 'sleep' mode (Works only on Pentium 2 computers) 18 Change the resolution to 640/480: Change the victim's screen resolution to 640/480 19 Appz running: View all the applications and tesks that are running in the victim's computer 20 Open ftp: Turn the victim's computer into a FTP site with FULL access to all of his files (After you press on this button open your ftp program, insert your victim's IP address, put port number 1012 user: Doly and password: 0wn3d and you are ready to connect to his computer) 21 Close ftp: Turn off the FULL access FTP site on the victim's computer (You will be able to connect to his computer by FTP if you'll press the Open FTP button again) 22 Open CD: Open the victim's CD-ROM drive 23 Close CD: Close the victim's CD-ROM drive 24 Max-volume: Set the victim's volume level to maximum 25 Min-volume: Set the victim's volume level to minimum 26 Show error screen: This will gradually fill the victim's screen with little error messages (If you wont stop it it will fill all of his screen) 27 Stop error screen: Stop filling the victim's screen with the error messages (Will delete all the messages that had already been on his screen) 28 Close windows: Close the victim's windows and restart his computer 29 Format: Format the victim's Hard Drive (This will format drive c:) 30 Password: Discover the victim's ISP UserName, Password and Dial Up Number (This will work only if the victim use the 'Save Password' option) 31 Run program: Run any program from the victim's computer (You should type the full directory of the program) 32 Run program: The same command as Run program but this will run the program hiden (The victim wont see the program is running) 33 Fatal error with msg: Make a fatal error with a msg from you in the victim's windows (Will also close his server so you will only be able to connect to the victims when he will reboot his computer again) 34 Sets all windows names: Change all the titles of the running applications to whatever you want 35 Sets the computer name: Change the victim's computer name to whatever you want 36 Send to URL: Send your victim to any URL you type in the text browse (If his browser isnt open it will open it automatically) 37 Change owner name: Change the victim's Windows owner and organization name to whatever you want 38 ICQ UIN: Discover the victim's ICQ UIN Number (If the victim doesnt have ICQ the number that will be 0) 39 Stuck mouse in max point: This will move the victim's mouse to the buttom left side of the screen every 0.0001 seconds (EXTREMLY ANNOYING ;) 40 Unstuck the mouse: This will bring back the victim's mouse to its original position and cancel the stuck mouse in max point. 41 Auto connect to IRC: Every infected computer will automaticly connect to the IRC. The server is irc.dal.net and the channel is #dolyt . Now you can know who are the infected computers without the port scanner. 42 Key Logger: A great key logger that identify all the keys (Including 'Enter') 43 D.I.R.C.F: This new feature will let you to find our all the Infected people IP address with no need of any irc program (D.I.R.C.F comes built in with the new version) 44 Multi Connection: Now you wont have problems connecting to people because someone had already connected before you. Doly Trojan server is now support multi connetion' Functions:Enable/Disable the double click mouse Set system colors FBI Screen Disconnect from the Internet Move mouse to max point Turn the computer to sleep mode Process list Remove windows background Show/Hide the Taskbar Swap the mouse buttons Show/Hide the mouse Change the title color to random color Change the display resolution to 640x480 Open FTP server Open/Close CD-ROM Change the sound volume (max/min) Show/Stop error screen Close all windows Format HDD Run program Run program in hidden mode Send fatal error message Set the names for all windows Set the computer name Go to URL Change owner name Close server Remove server

  • Alias

    Backdoor.DolyBackdoor.Doly.11Backdoor.Doly.135Backdoor.Doly.15Backdoor.Doly.16Backdoor.Doly.20TrojanDropper.Win32.Joiner.a

  • Exe

    dhacker.exedoly trojan.exedoly17remove.exedolyt12.exedolyt135.exedolyt17.exemdm.exememmanage.exendc.exends.exeProgram Filesdoly trojan1.6dolyt16.exeProgram Filesdoly trojan1.6setupsetup.exeProgram Filesdoly15dolyt15.exe

  • Dll

    data.dllProgram Filesdoly trojan1.6setupsetuplng.dll

  • Registry

    HKEY_LOCAL_MACHINEsoftware-a-=d=-m-doly trojan1.6 ameHKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionuninstalldolyHKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionuninstalldoly trojan 1.6HKEY_LOCAL_MACHINEsoftware g byte softwaresetupcurrentversionuninstall specialistdoly [email protected] (-a-=d=-m-)