00:00
00:00
Wurfel-Waffles
Just a super geeky guy who composes music in spare times.

Age 41, Male

Software Developer

TUM

Canada

Joined on 2/9/12

Level:
2
Exp Points:
20 / 50
Exp Rank:
> 100,000
Vote Power:
1.98 votes
Audio Scouts
2
Rank:
Civilian
Global Rank:
> 100,000
Blams:
0
Saves:
1
B/P Bonus:
0%
Whistle:
Normal
Medals:
22
Supporter:
11m 29d

IT in EXE!!!!

Posted by Wurfel-Waffles - April 11th, 2012


SUCCESS! I just successfully bind a module file and a module player together. The module itself is... huge, fucking 7.92 MB last time I checked. Because I use IT for high quality.

Player itself is 21 kb, yes I know it's huge. But any of you can write something that small, bite me.

Remember to read the README!!!

http://www.newgrounds.com/dump/download/3575bf87 de16c1faf4e94d4e04288c1f

With UPX compressed, 1.21 MB!!!

http://www.newgrounds.com/dump/download/de088671 6bd8100b515c784b14effb62

PS. It's not a virus so don't blame me if your PC goes panic. It can even play on Windows 95 (tested).

PPS. I can't release the player, yet. There are bugs floats all over the place. I need to add some hot key too. For example: quit... lol!


Comments

Congratulations on your deed.

thank you sir. Once I finish to fix the bugs then I can make this totally public, with source codes of course.

So basically you just used UPX to pack the files and exe into a small exe? Are you hardcoded it when packing? I can't unpack it.

Even though the music is cool but it's kinda annoying without hotkey. You must add a quit option.

Clever processing too. Hidden totally out of sight of the Task Manager and undetected by any of my AV. wtf? It's a perfect pack for virus. But too bad you use it for music matters. Lmao!

UPX has hardcode option. It's modified version of UPX (alpha version).

Yeah I know, I screw up the hotkey lol. I'm just plain lazy to actually do the job. Just cleaned up some codes and packed the shits, no bug check or anything. Run pretty well.

Shssh: Fact::: This pack originally was written by me for black box system testing when I was still working for a German security research lab. Yes, it was mean for a replica and harmless Trojan horse. Undetected by any AV known to men. Why? It use memory based to store its process. I use .NET framework as shield process.

C:/WINDOWS/assembly/GAC_MSIL/Syst em/2.0.0.0__b77a5c561934e089/Syst em.dll
C:/WINDOWS/Microsoft.NET/Framewor k/v2.0.50727/mscorlib.dll

It randomly generates replicas of itself in the system32, and run one by one.

Fact is, I completely remove that option, so you can see the process clearly with advanced process manager. It stays hidden.

Like I said, I was too lazy to actually reverse the hidden process into visible one.

The last bit of I code I wrote was about 14kb for Apple Basic circa 1986... probably another block, aka sprite game. Only had 128kb to work with memory-wise and the OS wouldn't work from the ROM's... the Apple IIc was my last Apple product... I learned early not to put my faith in fancy, high priced gadgets.

:D I didn't know you are a video game designer/programmer! 14kb game... wow!

I'm suck at writing game. Problem is anything which related to graphic interaction made by me must be bloated (shame on me).

Hold on... disassembler codes (ASM) give me 3 sections indicate kernel accessing with high uptime. Perhaps this is one of the ways you spoof and be spookie with my defense system.

You sneaky bastard. Although it actually does nothing harmful. However you gave me a jump when I see my RAM memories went from approx 500 MB to 900 MB in 2 sec when I try to terminate your darling mscorlib.dll; it truly runs a bunch of replicas up fast.

Also wtf is this shit? Self mutation? Nice encryption you played there. You lazy SOB. You should have remove these!