Jump to content

[Stable] OSBot 2.5.23


Alek

Recommended Posts

This release patches the Worlds API so it should be more dynamic to updates in the future. Additionally there was a detection concern that was addressed, so hopefully you should see less bans. This was only for stealth injection mode, mirror mode does not have this concern (of which I cannot discuss in detail).

 

Finally, if a user does not have the proper Java version to run OSBot they will get a specific error message instead of a generalized "please verify your boot options" message. They will be redirected to this article I wrote:
https://osbot.org/forum/java

Let me know how this release works/doesn't work.

Edit: Also big thanks to @Fruity for lending me an account to test with!

  • Like 9
  • Boge 1
  • Heart 2
Link to comment

EDIT. using stealth injection, gets to the login menu, and crashes after i login to runescape.  Left a HS error code on my desktop screen. have Java 8, worked until this new update.  

#
# A fatal error has been detected by the Java Runtime Environment:
#
#  EXCEPTION_ILLEGAL_INSTRUCTION (0xc000001d) at pc=0x0000000002c535a8, pid=10972, tid=0x000000000000112c
#
# JRE version: Java(TM) SE Runtime Environment (8.0_171-b11) (build 1.8.0_171-b11)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (25.171-b11 mixed mode windows-amd64 compressed oops)
# Problematic frame:
# j  org.osbot.rs07.Bot.getScriptExecutor()Lorg/osbot/rs07/event/ScriptExecutor;+0
#
# Failed to write core dump. Minidumps are not enabled by default on client versions of Windows
#
# If you would like to submit a bug report, please visit:
#   http://bugreport.java.com/bugreport/crash.jsp
#

---------------  T H R E A D  ---------------

Current thread (0x00000000166db000):  JavaThread "Random Executor" [_thread_in_Java, id=4396, stack(0x000000001b3b0000,0x000000001b4b0000)]

siginfo: ExceptionCode=0xc000001d

Registers:
RAX=0x00000000c0569eed, RBX=0x00000000000000b0, RCX=0x0000000018fb10b0, RDX=0x0000000000000050
RSP=0x000000001b4af0a0, RBP=0x000000001b4af0e0, RSI=0x00000000200123bf, RDI=0x0000000002c3835d
R8 =0x0000000000000000, R9 =0x0000000000008000, R10=0x0000000065bdb2f0, R11=0x000000001b4aef10
R12=0x0000000000000000, R13=0x0000000014b90c6c, R14=0x000000001b4af0f0, R15=0x00000000166db000
RIP=0x0000000002c535a8, EFLAGS=0x0000000000010293

Top of Stack: (sp=0x000000001b4af0a0)
0x000000001b4af0a0:   000000001b4af0a0 0000000014b90c68
0x000000001b4af0b0:   000000001b4af0f0 0000000018fb10b0
0x000000001b4af0c0:   0000000000000000 0000000014b90c80
0x000000001b4af0d0:   0000000000000000 000000001b4af0f0
0x000000001b4af0e0:   000000001b4af138 0000000002c380e0
0x000000001b4af0f0:   00000000c0567908 000000001b4af0f8
0x000000001b4af100:   000000001acd27da 000000001b4af178
0x000000001b4af110:   000000001acd3320 0000000000000000
0x000000001b4af120:   000000001acd2d98 000000001b4af0f0
0x000000001b4af130:   000000001b4af178 000000001b4af1c0
0x000000001b4af140:   0000000002c383a2 0000000000000000
0x000000001b4af150:   0000000000000000 0000000000000000
0x000000001b4af160:   0000000000000000 0000000000000000
0x000000001b4af170:   0000000000000000 00000000c056a1f0
0x000000001b4af180:   000000001b4af180 000000001478c4ab
0x000000001b4af190:   000000001b4af1d0 000000001480ee30 

Instructions: (pc=0x0000000002c535a8)
0x0000000002c53588:   54 38 05 20 00 00 00 00 01 00 00 00 00 00 00 00
0x0000000002c53598:   00 00 9f 11 00 00 00 00 e8 64 70 c0 00 00 00 00
0x0000000002c535a8:   f0 ba bd 65 00 00 00 00 68 03 c5 eb 00 00 00 00
0x0000000002c535b8:   00 00 00 00 00 00 00 00 84 c8 77 14 00 00 00 00 


Register to memory mapping:

RAX=0x00000000c0569eed is pointing into object: 0x00000000c0569ed8
org.osbot.rs07.event.ScriptExecutor 
 - klass: 'org/osbot/rs07/event/ScriptExecutor'
RBX=0x00000000000000b0 is an unknown value
RCX=0x0000000018fb10b0 is pointing into metadata
RDX=0x0000000000000050 is an unknown value
RSP=0x000000001b4af0a0 is pointing into the stack for thread: 0x00000000166db000
RBP=0x000000001b4af0e0 is pointing into the stack for thread: 0x00000000166db000
RSI=0x00000000200123bf is an unknown value
RDI=0x0000000002c3835d is at code_begin+2301 in an Interpreter codelet
invoke return entry points  [0x0000000002c37a60, 0x0000000002c38440]  2528 bytes
R8 =0x0000000000000000 is an unknown value
R9 =0x0000000000008000 is an unknown value
R10=0x0000000065bdb2f0 is an unknown value
R11=0x000000001b4aef10 is pointing into the stack for thread: 0x00000000166db000
R12=0x0000000000000000 is an unknown value
R13=0x0000000014b90c6c is pointing into metadata
R14=0x000000001b4af0f0 is pointing into the stack for thread: 0x00000000166db000
R15=0x00000000166db000 is a thread


Stack: [0x000000001b3b0000,0x000000001b4b0000],  sp=0x000000001b4af0a0,  free space=1020k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
C  0x0000000002c535a8
 

Edited by Trackmarks
more indepth
Link to comment
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...