-Collecting FTP / HTTP passwords from 95 + popular FTP-client and Web-browser from infected computers.
-Collecting E-mail password (POP3, IMAP, SMTP).
-Collecting signing certificates of executable files and drivers.
-Collect RDP(Remote Desktop Connection) passwords.
-Invisible to the user's...