
{"id":7280,"date":"2016-11-25T23:26:00","date_gmt":"2016-11-25T22:26:00","guid":{"rendered":"https:\/\/www.trucnet.com\/?p=7280"},"modified":"2016-11-25T23:26:00","modified_gmt":"2016-11-25T22:26:00","slug":"runpe-detector-1-0-5640-build-65324","status":"publish","type":"post","link":"https:\/\/www.trucnet.com\/en\/runpe-detector-1-0-5640-build-65324\/","title":{"rendered":"RunPE Detector 1.0.5640 build 65324"},"content":{"rendered":"<p>RunPE Detector is a security program that requires no installation, specifically designed to detect and eliminate certain suspicious processes. Phrozen Software has created a new way to detect and remove illegitimate remote access software (RAT).<\/p>\n<p><span style=\"color: #008000;\"><strong>A closer look at malware\/viruses known as RATs:<\/strong><\/span><br \/>\n(RAT stands for Remote Access Tool, but they are mainly used to build a botnet).<br \/>\nUnder the guise of computer administration and remote access programs (such as VNC or Teamviewer), these programs are distributed and used as Trojans.<\/p>\n<p>There are various RATs, one of the oldest is BlackShades, the most used is Darkomet or NanoCore.<br \/>\nRATs are sold but cracked versions can be found, tutorials (including videos on youtube) exist in abundance, therefore anyone, who has very little knowledge, can create their own Botnet (network of infected PCs).<\/p>\n<p>RATs operate in Client\/Server mode; you run a server and clients connect to it.<br \/>\nThe goal is to get the client-side component to execute without the PC user&#039;s knowledge in order to take control of the machine, which is generally quite simple, via social engineering, since the targeted individuals are usually not very computer savvy.<\/p>\n<p><strong><span style=\"color: #ff6600;\">Some common RATs (Remote Access Control):<\/span><\/strong><br \/>\nNanoBot and MSIL:NANOCORE<br \/>\nMSIL\/IMMIRATE<br \/>\nBACKDOOR:WIN32\/XTRAT<br \/>\nTROJAN.CHICKIL<br \/>\nWORM:WIN32\/AINSLOT.A<br \/>\nMSIL\/OMANEAT<\/p>\n<p><strong><span style=\"color: #ff6600;\">The most virulent ones that bypass antivirus software:<\/span><\/strong><br \/>\nBiFrose<br \/>\nBackdoor.Prorat<br \/>\nBackdoor.Cybergate<br \/>\nDarkoMet<br \/>\nBackdoor: Win32\/Fynloski<\/p>\n<hr \/>\n<p><span style=\"color: #008000;\"><strong>Configuration:<\/strong><\/span><br \/>\n\u2013 Windows (x32\/x64 Bits): XP, Vista, 7, 8, 8.1, 10<br \/>\n\u2013 Processor: Pentium 4 3GHz<br \/>\n\u2013 RAM: 1 GB<br \/>\n\u2013 Disk space: 20 MB<\/p>\n<hr \/>\n<p><span style=\"color: #0000ff;\"><strong>Facility :<\/strong><\/span><br \/>\nExecute : <strong>Detector.exe<\/strong><\/p>\n<hr \/>\n<p><span style=\"color: #008080;\"><strong>- Language :<\/strong><\/span> English<br \/>\n<span style=\"color: #008080;\"><strong>- Size<\/strong> <\/span>: 5.9 MB<\/p>\n<p><a href=\"http:\/\/uptobox.com\/mzlk0qechngf\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Uptobox server<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/1fichier.com\/?nt8kcpzxi7\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Server 1File<\/small><\/span><\/a><\/p>\n<p><a href=\"https:\/\/mega.nz\/#!whpx1bSQ!cj86S2Dv5-SPLMJ5pduTdLVxnC6wqWLxi5CZu6aukf8\" class=\"su-button su-button-style-flat\" style=\"color:#FFFFFF;background-color:#008A56;border-color:#006f45;border-radius:6px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#FFFFFF;padding:6px 18px;font-size:14px;line-height:21px;border-color:#4dae89;border-radius:6px;text-shadow:0px 0px 2px #000000\"><i class=\"sui sui-arrow-circle-down\" style=\"font-size:14px;color:#FFFFFF\"><\/i> DOWNLOAD<small style=\"padding-bottom:6px;color:#FFFFFF\"> Mega Server<\/small><\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>RunPE Detector is a security program that requires no installation, specifically designed to detect and eliminate certain suspicious processes. Phrozen Software has created a new way to detect and remove illegitimate remote access software (RAT). A closer look at the malware\/viruses known as [\u2026]<\/p>","protected":false},"author":1,"featured_media":7282,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1749],"tags":[2149,897,564,2916,2914,2912,2913,2051,131,2915,1986,898],"class_list":["post-7280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-logiciels","category-securite","tag-analyser","tag-anti-malware","tag-logiciel","tag-malwares","tag-processus","tag-runpe","tag-runpe-detector","tag-scan","tag-securite","tag-supprimer","tag-trojan","tag-virus"],"aioseo_notices":[],"modified_by":"Auteur","_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/7280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/comments?post=7280"}],"version-history":[{"count":0,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/posts\/7280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media\/7282"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=7280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/categories?post=7280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/tags?post=7280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}