# BGX使用教程

<figure><img src="https://1382592200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7YXEHggLzaiKwZjRSOD4%2Fuploads%2FepS7HovQoargHLtFiEcJ%2Fbxg.png?alt=media&#x26;token=d8320442-c8be-4bdc-8af7-072e46d15fba" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1382592200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7YXEHggLzaiKwZjRSOD4%2Fuploads%2FNVpBO5OXjpLxpsFXX8rp%2Fchannels4_profile.jpg?alt=media&#x26;token=0e3b60af-a037-4436-adc0-52ba96524c46" alt=""><figcaption></figcaption></figure>

## 注入前设置

{% hint style="danger" %} <mark style="color:red;">**电脑设置:**</mark>

<mark style="color:red;">**卸载电脑里的所有**</mark><mark style="color:red;">**`杀毒`**</mark><mark style="color:red;">**软件(**</mark>~~<mark style="color:red;">**电脑管家 360 鲁大师**</mark>~~<mark style="color:red;">**&#x20;**</mark><mark style="color:red;">**等等) 以及 关闭**</mark><mark style="color:red;">**`防火墙`**</mark>

<mark style="color:red;">**关闭电脑里的**</mark><mark style="color:red;">**`自带杀毒`**</mark>

<mark style="color:red;">**卸载**</mark><mark style="color:red;">**&#x20;**</mark><mark style="color:red;">**`Faceit反作弊`**</mark><mark style="color:red;">**&#x20;**</mark><mark style="color:red;">**和**</mark><mark style="color:red;">**&#x20;**</mark><mark style="color:red;">**`瓦洛兰特反作弊Valorant Anti-Cheat)`**</mark>

<mark style="color:red;">**关闭**</mark><mark style="color:red;">**`hyper-v`**</mark><mark style="color:red;">**以及和**</mark><mark style="color:red;">**`虚拟化相关的所有选项`**</mark>&#x20;

<mark style="color:red;">**amd用户需要在**</mark><mark style="color:red;">**`bios`**</mark><mark style="color:red;">**内关闭**</mark><mark style="color:red;">**`svm`**</mark>&#x20;

<mark style="color:red;">**关闭**</mark><mark style="color:red;">**`ipv6`**</mark>&#x20;

<mark style="color:red;">**卸载**</mark><mark style="color:red;">**`奥创中心`**</mark><mark style="color:red;">**并杀死所有的**</mark><mark style="color:red;">**`ASUS`**</mark><mark style="color:red;">**相关进程（可以使用**</mark><mark style="color:red;">**`g-helper`**</mark><mark style="color:red;">**代替）**</mark>
{% endhint %}

{% embed url="<https://github.com/ionuttbara/windows-defender-remover>" %}
**你可以使用这个工具关闭杀毒和防火墙 （在卸载Windows defender之前记得系统创建还原点以免后续需要使用Windows defender）**
{% endembed %}

## 下载

{% embed url="<https://hzmod.lanzoue.com/b0w80gq0d>" %}

## 注入

**下载后`管理员`运行注入器**

> **其注入器的具体位置在`C:\Users\对应用户\AppData\Roaming\760ff7304e298507dc20f850fef7bcb4\apex\lib`文件夹中。**

**裸连即可注入，不过速度较慢。**

**如图操作：**

<figure><img src="https://1382592200-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7YXEHggLzaiKwZjRSOD4%2Fuploads%2FxNoDVYbuqZGiN6dQK48k%2Fimage.png?alt=media&#x26;token=6dd7f104-ebef-49e0-8a02-59d0b3b11587" alt=""><figcaption></figcaption></figure>

**点击`登录`后**

**当注入器显示 "**<mark style="color:blue;">**`Waiting for process..`**</mark>**"进入APEX游戏然后等待`注入完成`即可**

## **使用** <a href="#shi-yong" id="shi-yong"></a>

**点击 `INS` 呼出/隐藏菜单**

**`鼠标点击` 操控菜单**


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.hzz.im/g/apex/bgx/use.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
