Member
- Joined
- Oct 11, 2023
- Messages
- 105
- Thread Author
- #1
Let's start, I think, with the basics and the very beginning. Current file types for infection at the moment:
Name.exe
A regular encrypted file, usually disguised as a token. Personally, I use a dropper and inflate the file itself to 20-50 MB. I put the launch in 20-30 seconds, since some events may trigger on the instant runexe. So that's the best option for me. Since I started crypting myself, I sometimes have detectors too. 0-2 out of 26 in scanttime and 0-3 in runtime. You can talk about cryptocurrencies for a long time, but not the point, there are a whole bunch of services and people who do this at a professional level. As a small example: A person assured me that he had an absolutely crystal file, but after he changed the region in Windows....
he immediately had detectors. So when using crypts, keep in mind that for the most part, almost all avs and even more so vds have regional databases too. I personally crypt for myself under the USU or under France. (although I know the attack from chekzily base under the YUSA machine)
Carders Club
Let's take a closer look at what can be done with the exe
First, to get around the total virus itself, you need to inflate the file over 650 MB, since up to 650 MB can be uploaded to
It is convenient for some people to spill files like this, because some people start scanning files, which can already protect them at least with this and increase the life of the crypt. There will always be detections for the total virus, because they have a global database, since they are regional on avcheck and other file scanning resources (mostly in the USA).
Using files of 650 MB+ is not always convenient, much less replacing them, and so we start using launchers.
Walking around the forum, I came across such an interesting thing.
It was quite interesting, so I decided to try it out and see what happens.
Name.exe
A regular encrypted file, usually disguised as a token. Personally, I use a dropper and inflate the file itself to 20-50 MB. I put the launch in 20-30 seconds, since some events may trigger on the instant runexe. So that's the best option for me. Since I started crypting myself, I sometimes have detectors too. 0-2 out of 26 in scanttime and 0-3 in runtime. You can talk about cryptocurrencies for a long time, but not the point, there are a whole bunch of services and people who do this at a professional level. As a small example: A person assured me that he had an absolutely crystal file, but after he changed the region in Windows....
he immediately had detectors. So when using crypts, keep in mind that for the most part, almost all avs and even more so vds have regional databases too. I personally crypt for myself under the USU or under France. (although I know the attack from chekzily base under the YUSA machine)
Carders Club
Let's take a closer look at what can be done with the exe
First, to get around the total virus itself, you need to inflate the file over 650 MB, since up to 650 MB can be uploaded to
You do not have permission to view link
Log in or register now.
.
It is convenient for some people to spill files like this, because some people start scanning files, which can already protect them at least with this and increase the life of the crypt. There will always be detections for the total virus, because they have a global database, since they are regional on avcheck and other file scanning resources (mostly in the USA).
Using files of 650 MB+ is not always convenient, much less replacing them, and so we start using launchers.
Walking around the forum, I came across such an interesting thing.
It was quite interesting, so I decided to try it out and see what happens.