ExileAPI 3.12 Release menu

Shout-Out

User Tag List

Page 24 of 33 FirstFirst ... 202122232425262728 ... LastLast
Results 346 to 360 of 493
  1. #346
    Tonkan's Avatar Member
    Reputation
    12
    Join Date
    Feb 2007
    Posts
    77
    Thanks G/R
    12/11
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Rocker866 View Post
    where can i get the addon that shows the xp u gain for each zone etc
    GitHub - IlliumIv/MiscInformation

    ExileAPI 3.12 Release
  2. #347
    its's Avatar Member
    Reputation
    1
    Join Date
    Oct 2020
    Posts
    2
    Thanks G/R
    4/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hi, windows defender non-stop killed loader.exe
    I added an executable to the exception, but still
    Virus total:
    VirusTotal

  3. #348
    Forumuser1000's Avatar Active Member
    Reputation
    27
    Join Date
    Mar 2017
    Posts
    250
    Thanks G/R
    149/21
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by its View Post
    Hi, windows defender non-stop killed loader.exe
    I added an executable to the exception, but still
    Virus total:
    VirusTotal
    Same for me. It started happening about 6 hours ago. Windows defender just keeps targeting it.

  4. #349
    Queuete's Avatar Elite User
    Reputation
    549
    Join Date
    Dec 2019
    Posts
    284
    Thanks G/R
    118/486
    Trade Feedback
    0 (0%)
    Mentioned
    47 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by its View Post
    Hi, windows defender non-stop killed loader.exe
    I added an executable to the exception, but still
    Virus total:
    VirusTotal
    Originally Posted by Forumuser1000 View Post
    Same for me. It started happening about 6 hours ago. Windows defender just keeps targeting it.

    Troubleshooting

    1. The Hud wont start.
    ...
    - turn of your firewall and antivirus and try again. (Thanks @bobTheBuilder69)
    The last update was 2 days ago with a one line change from snowhawk within a context which makes no difference at all for antivirus detection. The last update before that was 15 days ago. So most likely your windows defender got updated and is trying to kill it now.

  5. Thanks its, AnotherOneOnTheGreyArea (2 members gave Thanks to Queuete for this useful post)
  6. #350
    VeryTraveller's Avatar Member
    Reputation
    2
    Join Date
    Nov 2020
    Posts
    16
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Infected! . Issue #63 . Queuete/ExileApi . GitHub Read this ASAP. @Queuete closed my "issue" on github. He said "AV got update 2 days ago"
    Maybe his pc is infected and maybe he is didnt even know this but Last release %100 INFECTED!!! and "Win32/Wacatac.C!ml" is very dangerous ! Scan your pc and change your passwords ASAP

  7. #351
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1422
    Join Date
    Apr 2006
    Posts
    3,946
    Thanks G/R
    285/573
    Trade Feedback
    1 (100%)
    Mentioned
    7 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by VeryTraveller View Post
    Infected! . Issue #63 . Queuete/ExileApi . GitHub Read this ASAP. @Queuete closed my "issue" on github. He said "AV got update 2 days ago"
    Maybe his pc is infected and maybe he is didnt even know this but Last release %100 INFECTED!!! and "Win32/Wacatac.C!ml" is very dangerous ! Scan your pc and change your passwords ASAP
    If you do not trust the binary he provides, you can rebuild the executable yourself and use that. I am not saying it is clean, but I have no reason to believe that the binary has been infected.

  8. Thanks Queuete (1 members gave Thanks to Sychotix for this useful post)
  9. #352
    VeryTraveller's Avatar Member
    Reputation
    2
    Join Date
    Nov 2020
    Posts
    16
    Thanks G/R
    1/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by Sychotix View Post
    If you do not trust the binary he provides, you can rebuild the executable yourself and use that. I am not saying it is clean, but I have no reason to believe that the binary has been infected.
    Believe me or not. Last version is INFECTED. As I said maybe he didnt even know. His pc is also infected. he needs to scan. If you need prof scan older versions. you will see what I mean

  10. #353
    pushedx's Avatar Contributor
    Reputation
    259
    Join Date
    Nov 2009
    Posts
    137
    Thanks G/R
    8/137
    Trade Feedback
    0 (0%)
    Mentioned
    12 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by VeryTraveller View Post
    Believe me or not. Last version is INFECTED. As I said maybe he didnt even know. His pc is also infected. he needs to scan. If you need prof scan older versions. you will see what I mean
    Here's your basic misunderstanding about how AV scans work. I just did this myself because I've seen people make this mistake over and over.

    The first scan you referenced was "cached" and was before AVs got updated. Upon scanning the file, the file was "clean" because at the time of the first scan, no AVs detected anything.

    Some days passed and AVs got updated.

    If you "rescan" the same file from before, it will now show it has issues, despite being the same exact file that was "clean" days ago.

    This is because AVs got updated, despite the program itself not changing.

    This can mean two things:
    1. It's commonly a false positive
    2. There was something undetected that is now detected and you should check your system

    Here's the proof: Imgur: The magic of the Internet

    Notice the file hashes are the same (since I just downloaded it from GitHub). Also notice in the clean scan, it was cached from 10 days ago. I triggered a new scan on the same file and it now has results showing up.

    So it's pretty much what Sychotix and Queuete mentioned. Compile the program yourself if you don't trust it, but there's little reason to think it's magically infected now when it hasn't changed, but certain AVs did change.

  11. Thanks Sychotix, Queuete, AnotherOneOnTheGreyArea, poeking99 (4 members gave Thanks to pushedx for this useful post)
  12. #354
    killergate's Avatar Member
    Reputation
    1
    Join Date
    Jul 2019
    Posts
    1
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by pushedx View Post
    Here's your basic misunderstanding about how AV scans work. I just did this myself because I've seen people make this mistake over and over.

    The first scan you referenced was "cached" and was before AVs got updated. Upon scanning the file, the file was "clean" because at the time of the first scan, no AVs detected anything.

    Some days passed and AVs got updated.

    If you "rescan" the same file from before, it will now show it has issues, despite being the same exact file that was "clean" days ago.

    This is because AVs got updated, despite the program itself not changing.

    This can mean two things:
    1. It's commonly a false positive
    2. There was something undetected that is now detected and you should check your system

    Here's the proof: Imgur: The magic of the Internet

    Notice the file hashes are the same (since I just downloaded it from GitHub). Also notice in the clean scan, it was cached from 10 days ago. I triggered a new scan on the same file and it now has results showing up.

    So it's pretty much what Sychotix and Queuete mentioned. Compile the program yourself if you don't trust it, but there's little reason to think it's magically infected now when it hasn't changed, but certain AVs did change.

    Sure - but the updated AV-definitions of Windows Defender doesnt detect the .38 release at all - just the new .39 release...

    /kg
    Last edited by killergate; 11-03-2020 at 03:53 AM.

  13. #355
    dlr5668's Avatar Contributor
    Reputation
    279
    Join Date
    May 2012
    Posts
    543
    Thanks G/R
    129/226
    Trade Feedback
    0 (0%)
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by killergate View Post
    Sure - but the updated AV-definitions of Windows Defender doesnt detect the .38 release at all - just the new .39 release...

    /kg
    Its very common to get false detection in net exe. For example, I had 31/70 in my app. After I split it to exe that loads dll it get reduced to 0/70. Same code just different load format

    TLDR dont worrry
    github.com/vadash/EZVendor

  14. #356
    GameHelper's Avatar ★ Elder ★ CoreCoins Purchaser
    Reputation
    2458
    Join Date
    Jun 2015
    Posts
    3,053
    Thanks G/R
    455/2203
    Trade Feedback
    0 (0%)
    Mentioned
    65 Post(s)
    Tagged
    1 Thread(s)
    Originally Posted by dlr5668 View Post
    Its very common to get false detection in net exe. For example, I had 31/70 in my app. After I split it to exe that loads dll it get reduced to 0/70. Same code just different load format
    TLDR dont worrry

    I think it's very important (for the safety of the community) to understand the root-causes of these false/true detection and try to either identify them or resolve them. Last time it happened I step up (as an HUD developer and the person who builds the executable) to identify them and resolve them. I expect the same from current maintainers/developers of HUD. I had to format my whole computer, at that time, just to keep the community safer.


    Also, community, please build your own Exe/Binary rather than depending on the maintainer/Developers binary till this issue is resolved. People work on HUD in their free time, so don't expect this to resolve soon.




    On a separate note FYI: Announcements - New Stash Tab Folders and Affinities System - Forum - Path of Exile
    No need for stashie anymore!!! yeay!!!
    Last edited by GameHelper; 11-03-2020 at 11:04 PM.

  15. Thanks AnotherOneOnTheGreyArea (1 members gave Thanks to GameHelper for this useful post)
  16. #357
    pushedx's Avatar Contributor
    Reputation
    259
    Join Date
    Nov 2009
    Posts
    137
    Thanks G/R
    8/137
    Trade Feedback
    0 (0%)
    Mentioned
    12 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by zaafar View Post
    I think it's very important (for the safety of the community) to understand the root-causes of these false/true detection and try to either identify them or resolve them.
    Here's everything anyone should need to understand this is just another instance of a .net false positive.

    Once again, I'm not saying the program is "safe", since I didn't write it myself, so I'm not going to vouch for any code I didn't write, but rather there's no evidence of any relevant changes to "loader.exe" to make me believe it's now actually infected with anything.

    First, use a hex comparison tool (I use Hex Workshop) to see the differences between the old and and new file: Imgur: The magic of the Internet

    As you can see, there's two sets of changes between .38 and .39.

    The first one in the PE header is due to a recompile. It's only 3 bytes changed. Just knowing the basics of the PE header, you know that's not what's getting flagged (unless it was the only change, in which case you've certainly gotten unlucky with a sig match). Recompiles means date time stamp changed, so that's what this most likely is, but we can confirm it later.

    The process to test is simple: modify each set of changes bytes and see if the exe is still flagged. If it is, you know that's not the sig being hit, and if it's not, you know it is. I've done this myself, and this first set of changes is not it, and I'd not expect it to be either for previously mentioned reasons.

    Next set of changes is 16 bytes. I modified these bytes to all FF .. FF and reopened the file. No more AV flag, so this is the sig that got matched.

    The question then is "what are these bytes for and why did they change"

    Since "loader.exe" is a .net app, you can use "ildasm.exe" that comes with Visual Studio, and dump the exe along with the actual bytes of what is what. You can then compare the generated IL files to see what changed.

    Here are the results: Imgur: The magic of the Internet

    As you can see the first set is the compile time change.

    The second set, which is what is causing the new detection, is because the MVID (Module.ModuleVersionId Property (System.Reflection) | Microsoft Docs) changed due to a recompile.

    That's it. A uniquely identifying GUID (that has no relation to any executable code) changed due to a recompile and now AVs are flagging the exe as malicious.

    This is simply a false positive, which happens with .net. The community solution is to just recompile a new exe and reupload it after making sure the new version doesn't get matched the same way (I had to open the loader in x64dbg to get my windows defender to trigger, scanning the file didn't do it).

    Hope that helps!

  17. Thanks dlr5668, mm3141, Sychotix, AnotherOneOnTheGreyArea, Queuete, GameHelper, poeking99 (7 members gave Thanks to pushedx for this useful post)
  18. #358
    Sychotix's Avatar Moderator Authenticator enabled
    Reputation
    1422
    Join Date
    Apr 2006
    Posts
    3,946
    Thanks G/R
    285/573
    Trade Feedback
    1 (100%)
    Mentioned
    7 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by pushedx View Post
    Here's everything anyone should need to understand this is just another instance of a .net false positive.

    Once again, I'm not saying the program is "safe", since I didn't write it myself, so I'm not going to vouch for any code I didn't write, but rather there's no evidence of any relevant changes to "loader.exe" to make me believe it's now actually infected with anything.

    First, use a hex comparison tool (I use Hex Workshop) to see the differences between the old and and new file: Imgur: The magic of the Internet

    As you can see, there's two sets of changes between .38 and .39.

    The first one in the PE header is due to a recompile. It's only 3 bytes changed. Just knowing the basics of the PE header, you know that's not what's getting flagged (unless it was the only change, in which case you've certainly gotten unlucky with a sig match). Recompiles means date time stamp changed, so that's what this most likely is, but we can confirm it later.

    The process to test is simple: modify each set of changes bytes and see if the exe is still flagged. If it is, you know that's not the sig being hit, and if it's not, you know it is. I've done this myself, and this first set of changes is not it, and I'd not expect it to be either for previously mentioned reasons.

    Next set of changes is 16 bytes. I modified these bytes to all FF .. FF and reopened the file. No more AV flag, so this is the sig that got matched.

    The question then is "what are these bytes for and why did they change"

    Since "loader.exe" is a .net app, you can use "ildasm.exe" that comes with Visual Studio, and dump the exe along with the actual bytes of what is what. You can then compare the generated IL files to see what changed.

    Here are the results: Imgur: The magic of the Internet

    As you can see the first set is the compile time change.

    The second set, which is what is causing the new detection, is because the MVID (Module.ModuleVersionId Property (System.Reflection) | Microsoft Docs) changed due to a recompile.

    That's it. A uniquely identifying GUID (that has no relation to any executable code) changed due to a recompile and now AVs are flagging the exe as malicious.

    This is simply a false positive, which happens with .net. The community solution is to just recompile a new exe and reupload it after making sure the new version doesn't get matched the same way (I had to open the loader in x64dbg to get my windows defender to trigger, scanning the file didn't do it).

    Hope that helps!
    Thank you for your continued contributions to the forum! This is a great explanation for going JUST far enough with digging into the binary.

  19. #359
    glbGG's Avatar Member
    Reputation
    1
    Join Date
    Nov 2020
    Posts
    5
    Thanks G/R
    0/0
    Trade Feedback
    2 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hi! I am trying to write a script which uses map device. Got two questions here.

    1. Are there any shared Enum Indexes for map device and map device buttons?
    I'v already found those by myself with DevTree. Those are
    IngameState.IngameUI.Children[60] for general map device window and
    ... [3][0][0] for 'activate' button.
    But are those indexes stored somwhere in shared Enums?

    2. I also want to check if the 'activate' button in mapdevice menu is clickable. (I.e. if it is highlited when i put a map inside and all options are set (zana mods) and map can be launched).
    Is there any way to check this?

    Thank you in advice!

  20. #360
    infoibrahimkekec's Avatar Member
    Reputation
    1
    Join Date
    Nov 2020
    Posts
    3
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hello, I have some questions.
    1- Is this bot mapping good with "Toxic Rain"
    2- Can you help me for setup
    3- Is there any video about how to use

Page 24 of 33 FirstFirst ... 202122232425262728 ... LastLast

Similar Threads

  1. ExileAPI Fork (with Release)
    By Queuete in forum PoE Bots and Programs
    Replies: 231
    Last Post: 06-22-2020, 05:19 PM
  2. [Release] 12/21/2007 Working Vendor's + Vendor's Items
    By ~SaiLyn~ in forum World of Warcraft Emulator Servers
    Replies: 31
    Last Post: 12-30-2007, 12:09 AM
  3. [RELEASE] Latest V 1.12.1 Hack
    By TehAvatar in forum World of Warcraft Bots and Programs
    Replies: 16
    Last Post: 05-08-2007, 02:48 PM
  4. [Release] Herbs to Flag [2.0.12]
    By Vladinator in forum World of Warcraft Model Editing
    Replies: 6
    Last Post: 05-06-2007, 06:41 AM
  5. [RELEASE] V1.12.1 Trainer 1.1 BETA Features
    By TehAvatar in forum World of Warcraft Bots and Programs
    Replies: 24
    Last Post: 03-18-2007, 01:48 PM
All times are GMT -5. The time now is 12:51 AM. Powered by vBulletin® Version 4.2.3
Copyright © 2024 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search