I just can't seem to get the trainer to work when using super or normal health. The health of the units (greenbar) just remains the same.
I hit the keybind, i mouse over the banner icon either on the bottom of the screen or on the game world but it just does nothing.
I get a different bgut similar problem.
I use option 1, and even though I achieved all objectives, the timer continues and the mission end never arrives!
I am locked in the scenario forever, without possibility to progress.
Anybody else had this or found a walkaround for the problem?
I've been a satisfied CH user for nearly a decade - this is the first time a CH trainer has popped a virus warning that looks real.
Tried to report malware and got sent to your VirusScan.jotti link - uploaded the Ancestors Legacy Trainer that CH created for me through that site and the file reported 4/14 scans reported malware:
Status: Scan finished. 4/14 scanners reported malware.
Scan taken on: September 26, 2021 at 1:18:16 AM GMT+2
Norton caught the trainer creating several working files as well as a long list of registry edits (partial list below):
Filename: ~cheathappenstrainer9993.tmp
Threat name: SONAR.ProcHijack!g47Full Path: Not Available
~cheathappenstrainer9993.tmp Threat name: SONAR.ProcHijack!g47
Locate
Source: External Media
File Actions
File: c:\Users\HKEY_USER\cheathappens\work\runtime\ ~cheathappenstrainer9993.tmp No Action Required
File: c:\Users\HKEY_USER\cheathappens\Debug\ ancestors legacy.debug Threat Removed
File: c:\Users\HKEY_USER\cheathappens\Work\ help.txt Threat Removed
File: c:\Users\HKEY_USER\cheathappens\Work\ s_68097_c.txt Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ trainer_troubleshooting_lite[1].asp Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ create-qr-code[1].png Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ trainer_troubleshooting_lite[1].htm Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ 0b84b562cb1f3d5bca0610d803819bbd600111c038f[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ bootstrap[1].css Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ aos[1].css Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ platform[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ popper.min[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ 17322734[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ all[1].css Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ uc[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ site[1].css Threat Removed
File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\Content\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\MetaData\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ bootstrap[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ jquery-3.3.1[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ css[1].css Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ aos[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ platform[1].js Threat Removed
File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ all[1].js Threat Removed
Directory: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\ QQIC2SI1 Threat Removed
____________________________
Registry Actions
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_06CB&PID_CDAD\ DeviceInstances->5&16A0E943&0&0003:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_1122\ DeviceInstances->7&2D9BDD49&0&0000:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0000:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0001:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0002:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&DC4DE3D&0&0001:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0003:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&16840E9C&0&0000:..., Registry Hive: 64 bit Repaired
Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&3A5B4C5E&0&0002:..., Registry Hive: 64 bit Repair
Our files are tested before we upload them to the website, the files are clean. more information here: Link
Feel free to report them als false positives.
The trainer worked fine for me the other day. Briefly lost power and went to restart everything only to have a .tmp file error when trying to run trainer again. I have rebooted, reinstalled, used CCleaner to wipte any garbage left behind, run as admin - nothing is working. TIA
.tmp fault means you AV has snagged something.
Try to exclude these folders and files.
C:\Users\USERNAMEHERE\Cheathappens\
C:\ProgramData\CheatHappens
C:\Users\USERNAMEHERE\AppData\Roaming\Cheat Happens\
C:\Users\USERNAMEHERE\AppData\Local\Temp\CH_Temp.tmp
C:\Users\USERNAMEHERE\AppData\Local\Temp~Mnn133.tmp
C:\Users\USERNAMEHERE\AppData\Local\Temp~CheathappensTrainer.tmp