Its a beautiful thing to only have to restart Max to get the latest. ini file but lets the TA’s to modify the BioWare specific includes to add new plugin\script directories that can be recursively sourced. This allows the individual user to have their own plugins listed in the. Internal Bioware Tools = Z:/art/tools/max2008/BWA_plugin.ini One handy thing I ran across was the use of an in the plugin.ini They are syned to Z: and sourced from there as well. One other thing I changed from the previous startup environment was to not copy files once synced to the C:\Program Files\Autodesk\3ds Max 2008 directory.
One obvious side effect of this implementation is that scripts and UI macros are not recursively sourced but have to be included manually.
This is done through a single configuration file that is parsed at startup and based on the first 4 numbers and an environment variable an entry is evaluated or not. This was due to several of the plugins that the animators used taking a “long” time to load. The new system makes it so every time they start Max the get the latest, additionally I setup discipline specific loading of scripts and plugins. The problem I found was that the artists both internal and external were not running this script on a regular basis and more than once time was spent trying to debug something that was out of date. bat file that synced perforce to the local machine and then copied files to the correct location. The process before required the artists to click a link to. At the moment, the C&C server is down and does not pose a potential threat.įor more confidence, you can block this IP at the system level.Recently I implemented a deployment system with the rollout of a new version of Max that works sucessfully.
#3ds max scripts code
The virus could execute arbitrary code by accessing the C&C server via IP: 175.197.4061. Fortunately, a signature has been added to Prune Scene that removes the remnants of this malicious code.
We managed to find out that this virus is a part of PhysXPluginMfx, which was rarely found on the Internet and therefore neither Autodesk Security Tools nor Prune Scene could detect it earlier. Many thanks to the specialists from ESET, especially Mathieu Tartare, for decompiling obfuscated. At the moment, works on disassemble, to establish the exact threat! NET 4.5 assembler (executing code from obfuscated *.dll file)Ī *.dll file with a virus on the VirusTotal website is recognized as Kryptik.XLW and carries a threat. Executes unknown code from base64 encoded string of.Creates unwanted properties in TrackViewNodes.AnimLayerControlManager and callback functions.Creates unwanted custom attributes for objects.Very long time to open / save / autosave / restart scene.