The remote host seems to be infected with a trojan horse. A trojan horse comes at least in two parts: a client and a server. The client is used by the hacker to connect to the victim' s machine. Once the server is installed on the victim's machine the hacker has full access to the victim's machine.


Check references for detailed information on removing this trojan horse.


Related Vulnerabilities