首页
社区
课程
招聘
[转帖]Kaspersky RectorDecryptor 2.4.5.0
发表于: 2012-10-16 00:53 1916

[转帖]Kaspersky RectorDecryptor 2.4.5.0

2012-10-16 00:53
1916
Kaspersky RectorDecryptor 2.4.5.0
8-10-2012
Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC.

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI.

Website:
4bbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6X3j5i4q4Q4x3V1k6Q4x3@1k6I4K9h3c8Q4x3@1b7J5x3o6R3J5z5o6t1J5y4K6f1`.


Download:
Portable
41fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6i4A6A6M7l9`.`.
52cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6h3g2^5k6b7`.`.


[培训]科锐逆向工程师培训第53期2025年7月8日开班!

上传的附件:
收藏
免费 1
支持
分享
最新回复 (6)
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
2
Kaspersky TDSSKiller 2.8.13.0
12-10-2012
Download portable
da4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4c8V1M7%4y4C8K9h3I4D9k6i4u0Q4x3X3g2*7K9i4l9`.
b3fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4c8V1M7%4y4C8K9h3I4D9k6i4u0Q4x3X3g2W2P5r3f1`.

A rootkit is a program or a program kit that hides the presence of malware in the system.
A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”).
Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits.
The utility supports 32-bit and 64-bit operation systems.
The utility can be run in Normal Mode and Safe Mode.
It detects and removes the following malware:
malware family Rootkit.Win32.TDSS;
bootkits;
rootkits.

More info:
606K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6X3j5i4q4Q4x3V1k6Q4x3@1k6I4K9h3c8Q4x3@1b7J5x3o6R3J5z5o6l9$3z5o6b7`.

上传的附件:
2012-10-16 01:35
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
Kaspersky XoristDecryptor v2.2.97.0
15-10-2012
Download
Portable:
a0aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2J5N6g2)9J5c8X3c8G2N6$3&6D9L8$3q4V1M7#2)9J5c8Y4g2@1K9h3I4K6i4K6u0r3P5r3!0J5K9i4y4@1k6r3g2U0M7Y4W2H3N6r3!0J5i4K6u0W2k6i4S2W2
e84K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2J5N6g2)9J5c8X3c8G2N6$3&6D9L8$3q4V1M7#2)9J5c8Y4g2@1K9h3I4K6i4K6u0r3P5r3!0J5K9i4y4@1k6r3g2U0M7Y4W2H3N6r3!0J5i4K6u0W2P5X3W2H3
030K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4S2G2M7X3W2K6N6r3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6h3g2^5k6b7`.`.
164K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4S2G2M7X3W2K6N6r3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6i4A6A6M7l9`.`.

Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.
The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer.
There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe.
The utility XoristDecryptor.exe is provided with a GUI.
More Info @ HomePage:
23fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6X3j5i4q4Q4x3V1k6Q4x3@1k6I4K9h3c8Q4x3@1b7J5x3o6R3J5z5o6l9&6x3K6t1`.

上传的附件:
2012-10-16 01:39
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
4
Kaspersky RectorDecryptor 2.5.0.0
Download:
Portable
8dfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6i4A6A6M7l9`.`.
d08K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6h3g2^5k6b7`.`.

上传的附件:
2012-10-17 16:08
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
5
Kaspersky XoristDecryptor v2.2.98.0
Download
Portable:
ae2K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2J5N6g2)9J5c8X3c8G2N6$3&6D9L8$3q4V1M7#2)9J5c8Y4g2@1K9h3I4K6i4K6u0r3P5r3!0J5K9i4y4@1k6r3g2U0M7Y4W2H3N6r3!0J5i4K6u0W2k6i4S2W2
c30K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2J5N6g2)9J5c8X3c8G2N6$3&6D9L8$3q4V1M7#2)9J5c8Y4g2@1K9h3I4K6i4K6u0r3P5r3!0J5K9i4y4@1k6r3g2U0M7Y4W2H3N6r3!0J5i4K6u0W2P5X3W2H3
bf0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4S2G2M7X3W2K6N6r3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6h3g2^5k6b7`.`.
800K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4S2G2M7X3W2K6N6r3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6i4A6A6M7l9`.`.

上传的附件:
2012-10-17 16:09
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
6
Kaspersky CapperKiller 1.0.5.0
Download
Portable
6baK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8X3y4S2M7s2m8W2M7X3E0A6L8r3I4W2M7W2)9J5k6h3g2^5k6b7`.`.
f78K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8X3y4S2M7s2m8W2M7X3E0A6L8r3I4W2M7W2)9J5k6i4A6A6M7l9`.`.

上传的附件:
2012-10-17 16:10
0
雪    币: 106803
活跃值: (202484)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
7
Kaspersky RectorDecryptor 2.5.5.0
1-11-2012
Download:
Portable
6ddK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6i4A6A6M7l9`.`.
79fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6s2y4Q4x3V1k6#2N6r3W2D9M7#2)9J5c8Y4u0W2j5%4c8G2M7X3c8W2j5%4u0&6M7s2c8G2M7W2)9J5k6h3g2^5k6b7`.`.

上传的附件:
2012-11-2 02:28
0
游客
登录 | 注册 方可回帖
返回