Check the profile of LjQujdAnywhere I can find player-made maps?
No and there never will be.Is there finally gameplay, or is it still just a animation player?
Quests and the overal story mode started serious production this year. It's in a very raw state right now but it is coming along nicely. You can check out current progress when you hit the NEW GAME option in main menu.No and there never will be.
This hasn't been my experience with Windows Defender. I check everything I download from the internet with it and never had it act out, with the exception of Cheat Engine. It makes sense that WD detects it as a potential threat since it's a memory editor.It's a false positive. Windows defender picks up trojans from everything, 99% of the time it's not actually real. The post you replied to clearly shows that 1 out of 71 AV programs detected a trojan, which is a clear indicator of a false positive.
That is possible of course, but it's the first time in this thread at least that multiple people detected a threat inside a new release.Mine's clean from same source. What happens here is some people are downloading without noscript/adblocker. When you try to click download on gofile, it will try to give you a misdirect/injected redirect. The redirect will give you an MSI or an EXE file that downloads the game AND inserts the trojan into the exe.
If you access with proper self protection software, your first click wont "do anything" as the intercept is denied. If you click again on download right away, you get the real zip. If you wait 5 seconds and click again, you'll get another misdirect attempt.
Seems like they're only targeting people who are not internet savvy enough to use a good blocker.
It's not just possible. I've verified it myself. I have the waterfox fork, noscript and ublock origin. I always get the .rar or .zip on the first try with gofile. I get NoScript XSS warnings. Guess what XSS is?This hasn't been my experience with Windows Defender. I check everything I download from the internet with it and never had it act out, with the exception of Cheat Engine. It makes sense that WD detects it as a potential threat since it's a memory editor.
That is possible of course, but it's the first time in this thread at least that multiple people detected a threat inside a new release.
In fact, anonfiles does it too. Notice it even apes the anonfiles icon.It's not just possible. I've verified it myself. I have the waterfox fork, noscript and ublock origin. I always get the .rar or .zip on the first try with gofile. I get NoScript XSS warnings. Guess what XSS is?You must be registered to see the links
On my chrome, it's virgin. Only installed for programs that use it as a dependency. If I open the same gofile link in chrome, it attempts to download the MSI installer instead of the zip/rar. If I open a private tab, I'll get offered a MSI installer or an EXE installer.
This is gofile allowing their ad providers to run code on their site. Said code directs you to a downloader file to a virus-attached version of the files.
Yeah downloading the game from random people on the internet is so much saverCan someone post a torrent link, kinda scared to open the one thats been posted so far cuz of trojan complains.
And likewise... with gofile, you can see I'm served both the file and a redirect.In fact, anonfiles does it too. Notice it even apes the anonfiles icon. View attachment 2703665
Notice it's .zip.vhd. Yet the URL is sysianedukeration.info?
Yeah, I'm aware of these kind of hijacks and misdirects. However, they are also nothing new, in fact every thread should be full of reports that a file contains a threat if it's just that since many file hosts are rather shady and dangerous to use without noscript and an adblock.It's not just possible. I've verified it myself. I have the waterfox fork, noscript and ublock origin. I always get the .rar or .zip on the first try with gofile. I get NoScript XSS warnings. Guess what XSS is?You must be registered to see the links
On my chrome, it's virgin. Only installed for programs that use it as a dependency. If I open the same gofile link in chrome, it attempts to download the MSI installer instead of the zip/rar. If I open a private tab, I'll get offered a MSI installer or an EXE installer.
This is gofile allowing their ad providers to run code on their site. Said code directs you to a downloader file to a virus-attached version of the files.
Because the trusted site isn't actually in on the scam and doesn't condone it. Usually, people have to report it to the host that it is happening and then the host has to figure out which ad partner is doing it and the host eliminates that ad partner. Or worse, the host has to complain to the ad network or switch ad networks to shed the bad advertiser that is malicious.Yeah, I'm aware of these kind of hijacks and misdirects. However, they are also nothing new, in fact every thread should be full of reports that a file contains a threat if it's just that since many file hosts are rather shady and dangerous to use without noscript and an adblock.
Or, to ask it the other way around: Why haven't the same people that don't have an adblock + noscript running complained the previous 10+ releases? I don't think that these kinds of attacks are uncommon.
Is this Trojan Free????Here is a torrent
File directly downloaded from the gofile
Please seed
Yup, MD5 checksum in the torrent matches checksum on gofile: 46F0BD4E7FEF6C83911F8049CA8E0540 - but this only proves that files are identical (so theoretically they could be modified before the upload). So there's little sense in such verification, unless dev himself provides checksum for original file on download page.Here is a torrent
File directly downloaded from the gofile
Please seed