I have used Avast, AVG, and this year I have been using Panda. I have never had a problem with any of the trainers from any of the programers.
1.) Create a folder to keep all of your trainers in(e.g. CH Trainers).
2.) Go into your AV of choice. Dig through the settings to find the exemptions list. Designate your CH Trainers/extensions folders as exempt.
3.) Start trainer and play game.
--Be sure when you open the RAR file after download that you drag and drop the files directly into your designated folder.
Problem solved.
[Edited by Vlad_the_Bad, 4/9/2015 9:43:37 AM]
No it's not that simple. That's how it worked in the past on the old trainers. I would just perform an exception to the folder with the trainers.
The few new trainers perform a dropper action into a tmp folder. It's that dropper/file in the tmp folder that triggers the warning. There is no way to exclude that. I can not exclude a whole tmp folder (for a good security reason). AND, if I exclude just that one file, then it will get detected again once the cheat is ran again and a new file is created.
When you download a file you can decide where the file will be stored (not a .tmp, .temp or any temporary location).
All my downloaded files go into a flagged (any AV) folder I named "Downloads" on my "M" drive with a link on my desktop, thus easy to 7Zip a CH trainer and install it in my "Games" folder.
The trainer executes fine...but then the dropper gets picked up. Here is an example from Assain Creed 4 Black flag AC4e
[code]
ESET NOD32 detection
4/12/2015 4:13:44 PM Real-time file system protection file C:\Users\\AppData\Local\Temp\~Mnn133.tmp a variant of MSIL/Packed.DotBundle.A suspicious application cleaned by deleting - quarantined Event occurred on a file modified by the application: C:\Users\\Desktop\Trainers\ac4e-tempnexus.exe
[/code]
[code]
Webroot Detection
Starting Routine> Removing c:\users\\appdata\local\temp\~mnn133.tmp...#(PX5: E194DB4B014606502E2E0852468D51000127909B - MD5: 1E9A89A4CD9E0BD150DB61211747EF2A)...
Deleting File> c:\Users\\AppData\Local\Temp\~Mnn133.tmp