Rubims are very nice man, Rubim's page ([PQR] Death Knight / Monk - Tank and DPS Profiles.) or heres the kinkehs that I had, last one I had that was updated Kinkehs PvE Frost
Rubims are very nice man, Rubim's page ([PQR] Death Knight / Monk - Tank and DPS Profiles.) or heres the kinkehs that I had, last one I had that was updated Kinkehs PvE Frost
Is there any love for ret anymore looking for a profile that can hold dps in heroic raid plzz help![]()
whats the possibility to get PQR work with wow64bit in near future ?
would love to see that happen.
Thats been asked a million times already and no, it wont happen any time soon if I recall reading answers from Xelper.
Hi all need help with the BM pvp profile made by Jarrito here http://www.ownedcore.com/forums/worl...pvp-5-1-a.html ([PQR] Hunter BM PVP (5.1))
Ok i would like to try and make this work can anyone help me at all i would like to make it so in 2vs2 arena my focus enemy will get scatter shot and freezing trap on them everytime its on cd please
Please help!!!--Code provided by Xelper
local targetTrapped = UnitDebuffID("target", 1499)
local _, FreezingTrapCD = GetSpellCooldown(1499)
if targetTrapped then
return true
end
if FreezingTrapTimeout ~= nil and FreezingTrapTimeout > GetTime() then
local targetName = UnitName("target")
if targetName == FreezingTrapTarget and FreezingTrapTarget ~= nil then
if FreezingTrapCD > 3 then
return true
end
end
else
FreezingTrapTimeout = nil
FreezingTrapTarget = nil
end
if IsLeftControlKeyDown() and GetCurrentKeyBoardFocus() == nil then
local ScatterShot = GetSpellInfo(19503)
local TrapLauncher = GetSpellInfo(77769)
local FreezingTrap = GetSpellInfo(1499)
local ScatterShotCD, ScatterDuration = GetSpellCooldown(19503)
ScatterShotCD = ScatterShotCD - GetTime() + ScatterDuration
local TrapLauncherBuff = UnitBuffID("player", 77769)
if ScatterShotCD < 3 and FreezingTrapCD < 3 then
CastSpellByName(ScatterShot, "mouseover")
return true
end
if ScatterShotCD > 20 and FreezingTrapCD < 3 and TrapLauncherBuff == nil then
CastSpellByName(TrapLauncher)
return true
end
if ScatterShotCD > 20 and FreezingTrapCD < 3 and TrapLauncherBuff then
RunMacroText("/cast "..FreezingTrap)
if FreezingTrapTimeout == nil or FreezingTrapTarget == nil then
FreezingTrapTarget = UnitName("mouseover")
end
FreezingTrapTimeout = GetTime() + 3
local PQR_TargetName = UnitName("target")
local friendPlates = GetCVar("nameplateShowFriends")
local enemyPlates = GetCVar("nameplateShowEnemies")
SetCVar("nameplateShowFriends", 0)
SetCVar("nameplateShowEnemies", 0)
CameraOrSelectOrMoveStart()
CameraOrSelectOrMoveStop()
SetCVar("nameplateShowFriends", friendPlates)
SetCVar("nameplateShowEnemies", enemyPlates)
local PQR_TargetNameNew = UnitName("target")
if PQR_TargetName ~= nil then
if PQR_TargetName ~= PQR_TargetNameNew then
TargetLastTarget()
end
else
ClearTarget()
end
return true
end
end
Just one word AVERY (Avery Ret Profile)![]()
Thanks so much for all the hard work you invested in this program, works great, really apreciate it!
huh, i tested something.
the pqr updater file from the first page is infected. malware bytes picked up a msi installer and removed it from the exe and it shows the same size as my clean version with same hashes.
noticed that is the same msi package that filebeam downloads are getting hit with. my link: https://dl.dropbox.com/u/23527046/PQRUpdater.exe is clean until xelper checks his file.
file found: AMDEx3.msi in C:\WIndows\Installer\ folder
Last edited by crystal_tech; 01-08-2013 at 08:35 AM.
Please if someone helped you donate rep to them.
Can someone please debug this for me?
No Abilities getting used , except AMZ and DnD.
https://dl.dropbox.com/u/24969605/DEATHKNIGHT.rar
Note: This won't perform better or equal to Kinkehs/Rubims profiles. This is a rotation based on Simc for my own character.
greetz
Weischbier
As i already reported yesterday, where everyone told me "your stupid ronja - turn off your antivir" (more or less)
Thanks for checking it twice Crystal.
We've also checked it this morning in the company
The Trojan injects to svchost.exe. here it starts to download the maincode (password stealer)
the maincode has ben placed on our test-machine at %TEMP%\atixx.tmp
Affected Registry Entrys:
Local_Machine\SYSTEM\ControlSet001\Services\6to4\Parameters\ServiceDll AMDEx3.msi
Local_Machine\SYSTEM\ControlSet002\Services\6to4\Parameters\ServiceDll AMDEx3.msi
Local_Machine\SYSTEM\CurrentControlSet\Services\6to4\Parameters\ServiceDll AMDEx3.msi
Last edited by ronja75; 01-08-2013 at 10:35 AM.
Idd I scanned the updater from the first page and have same AMDEx3.msi. I've noticed the file was uploaded 26 days ago and file was created 13.12.2012. I have my PQR Updater from 18.03.2012. So yes is something about that file. I think its related with the days when Xepler has problems with his account.
Have the updater from 3/18/12 aswell and it's clean, I'll upload it if needed.