I'm still too scared to start up Blockland. Is there a way to remove the malicious code by hand without messing up the script? Or will the update be installed before the code can start deleting files?
You can patch it yourself. Open Gamemode_Slayer and navigate to \client\dependencies\GUI.cs
Scroll to the bottom and remove the last line which should be "schedule(0, 0, fixSlayerClientConfig);"
If that is not the last line, your version isn't infected.
I am quite pleased with Zapk's quick cooperation with me to fix the issue. In my mind, this makes him a less likely suspect. Now we need to find out who caused it. Before Zapk updated, he sent me a line from his website's logs which he believed at the time was the hijacker.
5.172.248.223 - - [16/Aug/2014:13:16:51 -0400] "GET /domains/ftp.txt HTTP/1.0" 304 - "
http://zapkraft.net/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0"
The address 5.172.248.223 does not show up in any logs I have, and it could possibly be made up, but it's probably worth investigating anyways.