Description: Hidden process, the source code very well, a lot of Trojans have adopted this technology, publishing only learn to use, do not for illegal purposes.
To Search:
File list (Check if you may need any files):
NetApter.dpr
nthide.cfg
nthide.dof
Project1.cfg
Project1.dof
Project1.dpr
Project1.res
Unit1.dcu
Unit1.ddp
Unit1.dfm
Unit1.pas