|
|
|
|
|
#1 |
|
Join Date: Dec 2012
Location: Oppenheim, Rheinland-Pfalz (Deutschland/Germany)
|
Here is a programm which I made to simulate an enemy in GURPS. It is only the BETA and it will get some new features in the future. So if you find a bug or something which goes wrong send me a message.
Features: -basic-attributes -skills (you can add 12)and skill-rolls -basic-rolls (HT-rolls,ST-rolls,...) -modifiers for skill- and basic-rolls - fp and hp damage function (if you use eg.-1 you will get 1 point of hp/fp back) -unconscious and dead messages here is a picture of the programm: https://www.dropbox.com/s/9hbuu680himxz3p/GURPS.PNG source code: https://www.dropbox.com/s/po0w836lkf...Code-GURPS.txt and the projectfolder: https://www.dropbox.com/sh/fh7gw97zjldym5e/SJIB-lSM72 Download-Link: http://adf.ly/GhRfH Dropbox-Link http://adf.ly/GlWef Mediafire-Link I hope you will have fun with that programm ;) Last edited by XBott94; 01-04-2013 at 09:22 AM. |
|
|
|
|
|
#2 |
|
Join Date: Dec 2009
|
You're not long on the forum (as far as I can see) and it is an exe without source code. I don't think people should download it, unless someone can vouch that it is safe. I would advise you to include source code so that people can check.
Not that I specifically suspect wrong intentions. It is just that one can better be safe than sorry nowadays (unfortunately) |
|
|
|
|
|
#3 |
|
Computer Scientist
Join Date: Aug 2004
Location: Dallas, Texas
|
reported as Spam+malware or piracy, link leads to "movie downloader" exe
Last edited by jeff_wilson; 12-31-2012 at 02:54 AM. |
|
|
|
|
|
#4 |
|
Join Date: Dec 2012
Location: Oppenheim, Rheinland-Pfalz (Deutschland/Germany)
|
|
|
|
|
|
|
#5 |
|
Computer Scientist
Join Date: Aug 2004
Location: Dallas, Texas
|
There's no limit on link length here.
https://www.dropbox.com/s/lxfi7uf388...Beta%20v.1.exe is fine. The file showed clean on my system, ran without an installer, and did not challenge my protections other than the original permission to execute. |
|
|
|
|
|
#6 |
|
Join Date: Jul 2007
Location: Ann Arbor, MI
|
I haven't fully reversed it, but a first pass suggests a lot of calls into the crypto api that aren't necessary unless you're trying to conceal communication with a command and control server. Also a lot of calls into the threading API that a normal Delphi program doesn't use. Also a lot of calls into ACL apis, which you would make if you were trying to run a privilege escalation. Which fits with all of the calls for creating and running Nt services that I found.
I wouldn't run it on bare metal, put it in an isolated virtual machine with an air gap. Delphi 7 is a fairly popular tool in the European malware scene. And make sure you don't use that VM for anything else. I may pass this over to my colleagues who do spend their days reversing malware. Could be a neat new tool. But this thing is almost certainly adding your computer to a botnet, and if you monitor your network traffic there's a good chance that you'll find email going out for boner pills.
__________________
Online Campaign Planning Last edited by ClayDowling; 12-31-2012 at 09:09 AM. |
|
|
|
![]() |
| Tags |
| enemy, gurps 4e, helper, programming, xbott94 |
|
|