Hello, I'm not looking to disprove you, I'm just telling you the truth, I don't use VMProtect or Themida, And there is no further protection as any protection will cause VirusTotal to flag the file falsely.Quote:
I don't understand why you are only looking to disprove me in terms of what protection you use for your loader. The point is that it's protected. Okay so the information that I got that you used Themida then VMP was only half correct assuming what you are saying right now is true. I am a fair person & I will give you that. That doesn't really change anything. I still have a ton of doubt. The bottom line is that your loader was protected, your site should be secure, so why was someone able to alter your loader to give your users malware, by your own admission, if the loader/site are protected?
Also why do you expect us to believe that ACD, who are resellers, somehow learned to reverse & program & really left their primary Discord server ID in a JS file that is part of the malware, rather than a private/secure location for the data to be transmitted to & stored?
Why did you take so long to discover this? Why did you not clarify if it was a crack that was circulating? Why are people reversing the loader from your site & finding things?
Your answer to me really accomplishes nothing besides trying to flatter me & proving I was wrong about what protection you currently use, which you can easily change at any time.
I know your flattery of me is just to get me on your side & it won't work. We are going to sort this out the proper way.
The entire situation overwhelmingly points to you distributing malware.
As for your claims about malware not being profitable:
1. The measurements you've made in terms of how much you could make off the miner seem low. You'd make more from what I can see online from sources I trust.
2. The malware was not just a miner, it also replaced copied addresses with a new address. This is a method to steal virtually any amount of money imaginable considering you have no idea how much the target PC is moving in crypto.
3. You probably thought you wouldn't get caught, so no it's not a choice between selling cheats vs. malware, you tried to get both.
4. Cobalt sells very cheap & some of your products have even been for free. You'd certainly be motivated to do that if malware was involved.
5. I don't care if some 16 year old posted in your Discord "my device never got rat". That doesn't mean shit about how many users were given malware.
[Only registered and activated users can see links. Click Here To Register...]
Please go ahead and this yourself, modify the client exe, Modify the discord link in the client exe, It will work fine. :)
For your first point, Yes my calculations were incorrect, Because it was assuming that all the users were "mining", Which as many have said, not everyone has the "drm.exe".
Even If I got 80% more instead of 50%, Why would I risk the guaranteed 100% for 80%, This project isn't a 3 month or 6 month project, I like making cheats and want to continue it for as long as possible. especially having a semi-consistent income.
Your second and third point are contradicting, I was "replacing copied addresses" but also thought "that I wouldn't get caught".
I'm not dumb, If I were to go through all that trouble and risk my cheats reputation, And risk the growing cobalt subscriptions ( 2.7k last month, 3.4k this month ) And also thought that "I wouldn't get caught" You don't think I would've made it less obvious?
The bottom line is, No, the client is not protected, Anyone is able to do this with a free tool from the internet, It doesn't take a developer to do it, You can download the attached script file and observe it; it actually uses a public script called "HazardLogger". ACDiamond could've done this in less than 30 minutes and it doesn't take a genius to download a public program.