Question about bypass for xtrap in sro_client

05/12/2024 11:30 leiwis#1
I recently noticed that when bypassing the moment of saving the changes the executable detected it as a Trojan of type "Wacatac.H!ml" it worked on the original SRO_CLIENT without modifying the test client and it is not manipulated in any way since it It gives the error only after applying the patch through ollydb

I use these parameters:

Quote:
Xtrap 1st Check = 00831B20 (Replace With RETN)
Xtrap 2nd Check = 00B7AEF0 (NOP Untill Address) 00B7C3EF
My question is if there is any other method or some other type of patch to avoid this problem.;)
05/12/2024 12:18 Judgelemental#2
Quote:
Originally Posted by leiwis View Post
I recently noticed that when bypassing the moment of saving the changes the executable detected it as a Trojan of type "Wacatac.H!ml" it worked on the original SRO_CLIENT without modifying the test client and it is not manipulated in any way since it It gives the error only after applying the patch through ollydb

I use these parameters:



My question is if there is any other method or some other type of patch to avoid this problem.;)
Try the Address Patcher
Source: RZ

[Only registered and activated users can see links. Click Here To Register...]
05/12/2024 16:20 leiwis#3
Quote:
Originally Posted by Judgelemental View Post
Try the Address Patcher
Source: RZ

[Only registered and activated users can see links. Click Here To Register...]
Hello old friend, I hope you are well! Yes, I am aware of the program and I have used it and even if "Microsoft Defender" still detects it as a threat. I know perfectly well that it is a false positive but a normal user would not understand it like that when installing the client on their PC the antivirus will probably delete the sro_client which is not very pleasant.
10/28/2024 16:27 deluxe13#4
Quote:
Originally Posted by Judgelemental View Post
Try the Address Patcher
Source: RZ

[Only registered and activated users can see links. Click Here To Register...]
If i make it, sro_client shows as a virus from Defender. How to resolve this problem without malware alerts?
10/28/2024 20:27 romio100#5
To resolve the Xtrap issue and bypass the checks you have specified, you need to modify the software instructions at the specified addresses. Using tools like OllyDbg or Cheat Engine, which are reverse engineering tools that allow you to modify the binary instructions in memory for applications, can help.

Here are the steps that can help:

Open the executable file in OllyDbg or Cheat Engine:

Open the application or game that you are experiencing the Xtrap issue in using OllyDbg or Cheat Engine.

Get to the first address (Xtrap 1st Check = 00831B20):

In OllyDbg or Cheat Engine, navigate to address 00831B20.

Select the instruction at this address.

Replace the current instruction with a RETN (returns the program to the address it was called from).

Get to the second address (Xtrap 2nd Check = 00B7AEF0):

Go to address 00B7AEF0.

Fill the instructions from this address through 00B7C3EF with NOP (No Operation) instructions, so that the program skips this part of the code without executing any additional instructions.
10/28/2024 20:30 deluxe13#6
Quote:
Originally Posted by romio100 View Post
To resolve the Xtrap issue and bypass the checks you have specified, you need to modify the software instructions at the specified addresses. Using tools like OllyDbg or Cheat Engine, which are reverse engineering tools that allow you to modify the binary instructions in memory for applications, can help.

Here are the steps that can help:

Open the executable file in OllyDbg or Cheat Engine:

Open the application or game that you are experiencing the Xtrap issue in using OllyDbg or Cheat Engine.

Get to the first address (Xtrap 1st Check = 00831B20):

In OllyDbg or Cheat Engine, navigate to address 00831B20.

Select the instruction at this address.

Replace the current instruction with a RETN (returns the program to the address it was called from).

Get to the second address (Xtrap 2nd Check = 00B7AEF0):

Go to address 00B7AEF0.

Fill the instructions from this address through 00B7C3EF with NOP (No Operation) instructions, so that the program skips this part of the code without executing any additional instructions.

Thank u but then the defender alerts a virus on sro_client?
10/28/2024 20:35 romio100#7
any change that is not hidden by the protection programs will be detected as a virus. Test this code and check.
10/28/2024 21:53 deluxe13#8
Quote:
Originally Posted by romio100 View Post
any change that is not hidden by the protection programs will be detected as a virus. Test this code and check.
How can i Save then the exe file on ollydbg?
10/29/2024 09:52 romio100#9
To save an exe file in OllyDbg after editing it, you can follow these steps:

Complete the edits: Make sure you have made all the edits you want to the code.

**Go to the menu**: Click on "File" in the top left corner.

Choose "Save file": From the menu, choose "Save file", then select the path where you want to save the edited file.

Choose the format: Choose the save format as "Executable file (*.exe)".

Save the changes: After choosing the format and location, click "Save" to save the edited file.

Verify the edits: You can then run the file you saved to verify that the edits were successfully applied.
10/29/2024 19:06 deluxe13#10
[Only registered and activated users can see links. Click Here To Register...]
[Only registered and activated users can see links. Click Here To Register...]
I dont have Save File in File Corner bro
10/29/2024 21:17 romio100#11
When executing the program commands and completing the process of executing the executable file, it appears with the executable file saved, but this image is the user interface