RandomUser888dda
Static Analysis Expert
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 2
900 XP
-Connection-
*Simple Connection setting you can add more than one Ip and port with a password
[WinDir] [ProgramFiles] [Temp] [AppData] or Custom
*Delay Execution
*Application Name
*Startup [Hidden] [Persistence] [visible Msconfig Regedit]
*Process Injection Inject itself into a custom or selected process like svchost-Advance-
* form grabber CyptoChanger
* Capture screenshots at certain moments-BotKill-
* [DarkComet-Citadel-LostDoor-Amiboide-Blackshades-Spynet-Pandora-PythoRat-BetaBot-XtremeRat-Cybergate-Zeus-Ardamax-AlienSpy-Coolvibes-BlackWorm-Athena-MMBB-Archilaus-NGR Botnet-Albertino-DNARAT-SafeLoader-TrojanRat-SpyEye-Andromeda-BozokRat-Jrat-Ceberus-Nanocore-SmokeLoader-AthenaIrc-MonsterWorm-CarpedBotNetIceBergWorm-ImminentMonitor-GatakaBotnet-UnknownLogger-PonyStealer-IndetectablesRat-KrakenHTTPbot-BabylonRat-KnightLogger-GalaxyLogger-AgentTesla-CarbonGrabber-NovaLite]Analyze new processes or Each Process or all
-Recovery-
*Can ReCover
[GoogleChrome] [Mozilla FireFox][ComodoDragon][InternetExplorer][FileZilla][FlashFXP][SmartFTP][IPSwitch WS FTP][Miranda][Paltalk][Pidgin][TheBat][Becky][Flock][BulletProff FTP][Orbit Downloader][Safari][Opera][SeaMonkey][K-Meleon][ThunderBird][PocoMail][Cake Poker][Trillian][CoreFTP][DynDNS]
-Etras-
*Binder
* Hide File LockFile
*Request Admin Rights
*Bypass UAC Exploit
*BSOD Critical Process BlueScreen If killed
*Anti VirtualBox VmWare Sandboxie TaskManager
*Disable [Regedit] [CMD] [MSCONFIG] [TASKMANAGER] [Updates] [Firewall]
*BTC Ecode capture
-AVKiller-
*Kills
AVG >BitDefender >Rising >F-Port
Avast >MalwareBytes >TrojanR >PcTool
Eset >McAfee > Rising
Kaspersky >Adware > MicrosoftEssential
Comodo >G-Data >Norman
Avira >Zen0k >DrWeb
Norton >Asquared >Debank
Arcavir >Vipre >Coranti
AntiTrojan >TrendMicro >Ikarus
Panda >TrojanR >Gucup
-FakeMessage-
*Custom Message
*Custom Errors
*When to open
-KeyLogger-
*When to send logs
*sends to email and ftp
*Delete logs
-Miner-
*Clever mining
*Algorithm SHA256 SCrypt
*Manual
*CPU GPU Setting when to stop mining or stop mining
*IDLE Timing
-Build-
*UPX
*ICON Changer
*When to delete
*Execute If Have -Java-.NET
*OS Mac Windows Android Linux
*Hide Installation or Visible
-Others-
*Hidden TeamViewer
Link:
.zip/file
Use at your own risk, and it is advised to operate them within a secure environment such as a virtual machine (VMware) or a remote desktop protocol (RDP) session to prevent potential harm to your system.
*Simple Connection setting you can add more than one Ip and port with a password
[WinDir] [ProgramFiles] [Temp] [AppData] or Custom
*Delay Execution
*Application Name
*Startup [Hidden] [Persistence] [visible Msconfig Regedit]
*Process Injection Inject itself into a custom or selected process like svchost-Advance-
* form grabber CyptoChanger
* Capture screenshots at certain moments-BotKill-
* [DarkComet-Citadel-LostDoor-Amiboide-Blackshades-Spynet-Pandora-PythoRat-BetaBot-XtremeRat-Cybergate-Zeus-Ardamax-AlienSpy-Coolvibes-BlackWorm-Athena-MMBB-Archilaus-NGR Botnet-Albertino-DNARAT-SafeLoader-TrojanRat-SpyEye-Andromeda-BozokRat-Jrat-Ceberus-Nanocore-SmokeLoader-AthenaIrc-MonsterWorm-CarpedBotNetIceBergWorm-ImminentMonitor-GatakaBotnet-UnknownLogger-PonyStealer-IndetectablesRat-KrakenHTTPbot-BabylonRat-KnightLogger-GalaxyLogger-AgentTesla-CarbonGrabber-NovaLite]Analyze new processes or Each Process or all
-Recovery-
*Can ReCover
[GoogleChrome] [Mozilla FireFox][ComodoDragon][InternetExplorer][FileZilla][FlashFXP][SmartFTP][IPSwitch WS FTP][Miranda][Paltalk][Pidgin][TheBat][Becky][Flock][BulletProff FTP][Orbit Downloader][Safari][Opera][SeaMonkey][K-Meleon][ThunderBird][PocoMail][Cake Poker][Trillian][CoreFTP][DynDNS]
-Etras-
*Binder
* Hide File LockFile
*Request Admin Rights
*Bypass UAC Exploit
*BSOD Critical Process BlueScreen If killed
*Anti VirtualBox VmWare Sandboxie TaskManager
*Disable [Regedit] [CMD] [MSCONFIG] [TASKMANAGER] [Updates] [Firewall]
*BTC Ecode capture
-AVKiller-
*Kills
AVG >BitDefender >Rising >F-Port
Avast >MalwareBytes >TrojanR >PcTool
Eset >McAfee > Rising
Kaspersky >Adware > MicrosoftEssential
Comodo >G-Data >Norman
Avira >Zen0k >DrWeb
Norton >Asquared >Debank
Arcavir >Vipre >Coranti
AntiTrojan >TrendMicro >Ikarus
Panda >TrojanR >Gucup
-FakeMessage-
*Custom Message
*Custom Errors
*When to open
-KeyLogger-
*When to send logs
*sends to email and ftp
*Delete logs
-Miner-
*Clever mining
*Algorithm SHA256 SCrypt
*Manual
*CPU GPU Setting when to stop mining or stop mining
*IDLE Timing
-Build-
*UPX
*ICON Changer
*When to delete
*Execute If Have -Java-.NET
*OS Mac Windows Android Linux
*Hide Installation or Visible
-Others-
*Hidden TeamViewer
Link:
You must upgrade your account or reply in the thread to view the hidden content.
Loading…
www.mirrored.to
Loading…
www.4shared.com
Use at your own risk, and it is advised to operate them within a secure environment such as a virtual machine (VMware) or a remote desktop protocol (RDP) session to prevent potential harm to your system.