Description: LEXX can be used as a remote administrating tool or as a hacking tool. It consists of two files: server.exe & LEXX.exe. To use it, run server.exe on the victim s computer [Don t ask me how! Figure that out by yourself], find his/her IP number then run LEXX.exe onto your computer. That s about it, after that you can really have some fun with the victim.
To Search:
File list (Check if you may need any files):
LEXX14CS\Client\BrunnenG.nfo
........\......\Client.dof
........\......\Client.dpr
........\......\Client.res
........\......\IP.TXT
........\......\LEXX.DOC
........\......\LEXX.ICO
........\......\LEXXLOGO.BMP
........\......\trayLEXX.ico
........\......\UGNIS.BMP
........\......\Unit1.dcu
........\......\Unit1.dfm
........\......\Unit1.pas
........\......\Unit2.dcu
........\......\Unit2.dfm
........\......\Unit2.pas
........\......\Unit3.dcu
........\......\Unit3.dfm
........\......\Unit3.pas
........\......\Unit4.dcu
........\......\Unit4.dfm
........\......\Unit4.pas
........\......\Unit5.dcu
........\......\Unit5.dfm
........\......\Unit5.pas
........\......\Unit6.dcu
........\......\Unit6.dfm
........\......\Unit6.pas
........\......\DOWNLOAD\TEMP.BMP
........\......\LOG\LEXX_2000.01.04_0.txt
........\......\...\LEXX_2000.03.01_0.txt
........\......\...\LEXX_2000.03.01_1.txt
........\......\...\LEXX_2000.03.04_0.txt
........\......\...\LEXX_2000.08.18_0.txt
........\......\...\LEXX_2000.09.08_0.txt
........\......\...\LEXX_2000.09.08_1.txt
........\......\...\LEXX_2000.09.18_0.txt
........\......\...\LEXX_2001.02.01_0.txt
........\......\...\LEXX_23.04.00_0.txt
........\Server\Server.dof
........\......\Server.dpr
........\......\Server.res
........\......\TEMP.JPG
........\......\Unit1.dfm
........\......\Unit1.pas
........\Client\DOWNLOAD
........\......\LOG
........\Client
........\Server
LEXX14CS