That's probably the injector that is detected.
Dear MPGH members,
Like many other members in the A.V.A section I decided to hex edit my .dll files due to detection. (Yes I know there are many leecher, I am NOT one of them and never will be)
Anyway I tried to cipher the files first,
This never worked for me, even after ciphering it 2-3 times it is still detected.
After giving up on this I went for hex editing, this is also new to me but thanks to a good tutorial I was able to do it with Anti - XC.
I got it all done and injected the hex edited .dll and it did not work. I used a UAV hack.
I could use some help in this and I would love to learn about .dll files and injectors in the future.
Thanks,
Ryan.
That's probably the injector that is detected.
It's not the injector because I can run the injector without getting detected.
It does inject the .dll but the .dll stops working after hex editing it.
You mean it injects but the DLL doesn't work?
Also it doesn't matter if the injector isn't detected. Xigncode still has anti-injection methods in it. So the injection could be detected and not the injector itself.
Get what I mean?
Would it be a good idea for him to find some code for a manual mapper and change it in the injector? Am just asking Jabberwo0ck, and i'm still noob at all this, ok.
AznNicholas posted a thread in Coders section about this and released some code. @Hopeless Aim
I'm new to this so I'm trying to figure stuff out.
I appreciate all the help I can get.
Manual Mapping is a different kind of injection, which doesn't rely on an API of LoadLibrary.
I have no idea what you guys are talking about, sorry.
Its gives not a new inject i need euro in ava pm me pls i am new