Q1. In which programming language is written stub?
A1. Stub of Crypter is written in VB.NET, stub of Memory Dropper is written in AutoHotKey.
Q2. Is Crypter really FUD?
A2. Yes, crypter is FUD or UD with 1 or 2 detection, depends how much time was last update.
Q3. How often is update?
A3. Updates is free and it is weekly(Every 5-6 days).
Q4. Can Crypter bypass Runtime?
A4. Yes, we are using new unique method to bypass runtime without RunPE. Our Crypter has been tested over Nod 32 9 Advanced Memory Scanner/Avast Premier/Avira Free/Norton/McAfee/AVG and MS Essential(Win.Defender). All were bypassed sucessfully!
Q5. Is Crypter compatible with native files like DarkComet or Netwire?
A5. Basic Version is not compatible with native files, only .NET files! Extended version has unique Encrypted RunPE which support native files too like C/C++/Delphi/VB6 and memory dropper module which is compatible with native files like DarkComet(Delphi/C++).
Q6. Is Crypter compatible with .NET files like LuminosityLink, Imminent, Orcus etc?
A6. YES, all .NET files is compatible with both Basic and Extended version.
Q7. Can protected file be executed over Windows 10?
A7. Yes, without any problems.
Q8. Does BASIC version include Exploits?
A8. NO, Only Extended version has exploits!
Q9. Is silent .doc exploit FUD?
A9. FUD or UD, but all major AntiVirus has been removed including Avast/AVG/NOD 32/MS Essental/Norton/McAfee/Kaspersky etc...
Q10. How often you update exploits?
A10. When it get too much detection.
Q11. Office exploits is silent or macro?
A11. Both, we have both silent CVE 2010-3333 and macro exploits for Exel and Word.
Q12. What is the best Exploit?
A12. Help file exploit(.chm) for sure! It is FUD, working over all OS, no dependency! Also new .mht exploit is very good and stable!
Q13. Which version is compatible with silent exploits?
A13. Currently, we have 2 silent .doc exploit. First one CVE 2010-3333 (Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability.") And second one is Internet Exploit v.2 .hta .mht
Q14. Can i get discount or vouch copy?
A14. No vouch copy, discount is possible but for it you must be our co-worker, for more info ask on Skype for it.
Q15. what is the output size?
A15. Output size iz around 50-150 KB.
Q16. Do you accept PayPal or other payment?
A16. No, we can accept only Bitcoin right now.
Q17. Where i can scan my crypted files or exploits?
A17. Use ziscan.com or Poison scanner to scan crypted files or exploits, if you scan it on virustotal or nodistribute.com your license shoud be banned!
Q18. What is Bypass proactive?
A18. That is special module, which execute .exe via Microsoft powershell, it can be used to bypass UAC or Proactive/Cloud protection! Also it has Scthast startup to bypass some Proactive AntiVirus heuristic detection!
Q19. What if i get too much detection?
A19. If your file has detection like: Kazy, Bary, Zusy, Gen:Variant or HEUR:GEN32 please use Assembly Editor & Icon changer to remove it, otherwise send me a message for real detection like MSIL. Injetor, HEUR, Win32
Q20. How to update stub and application?
A20. Update every time your engine.dll file to get latest updates from our cloud system! To get last update click on About > Update engine.