Do the model files need to be specifically for this patch? Becasue every time i try to log in it says my files are corrupted. And i'm following all the steps for the MEF to work. It crashes at the Character Selection screen already.
Do the model files need to be specifically for this patch? Becasue every time i try to log in it says my files are corrupted. And i'm following all the steps for the MEF to work. It crashes at the Character Selection screen already.
My mef window is still dissapearing, any help?
http://www.yousendit.com/transfer.ph...457090c12ed5e0
got this all the time when i shall DL:
Model edit fix for live servers - v2.2.0 (Build 7272)
http://www.uberdarknet.com/WoW/modeleditlive.exe
new link without trojan pls
Seriously guys there lads put alot of time and effort into this and u all think they add trojans and shit, maybe if you actually read the previous posts rather than just the latest posts you`ll realise these Trojan claims are just rediculous.
Actually the PTR-one is still not working Chazwazza ;< The earlier problem is fixed now atleast, the one at the log in. But now it still gives errormsg on WoW.exe when characterscreen pops up.
And aye, I am pressing Home so that it's enabled again.
Tumbs up for the work though![]()
and for some reason my files aint working. might have to make new .mpqs for the new fix, dont know, could try i guess..
woop woop phoakin diddy daunauts!
Chaz, I'm still having problems with the PTR fix.
I'm doing the EXACT same thing I did before this and it worked with the MEF awhile ago for the PTR.
I press home, it says it's enabled again but I still crash at character screen.
Have you tested the latest PTR fix yet?
I can't log into the PTRs to test anything unfortunately, which has made things a lot more difficult. Upon entering my user/pass I get a "Game time expired, blah blah" error, even though logging into the live servers works fine because I have 60 days left on the account.
I've taken a look at my source and the WoW.exe code again and I can't work out what the problem is.
Code:.text:004020BB loc_4020BB: ; CODE XREF: sub_402070+30j .text:004020BB mov edx, [ebp-70h] .text:004020BE mov eax, [ebp-6Ch] .text:004020C1 push 4 .text:004020C3 push offset unk_8358E8 .text:004020C8 push 100h .text:004020CD push offset unk_8B0008 .text:004020D2 push edx .text:004020D3 push eax .text:004020D4 call sub_627670 .text:004020D9 add esp, 18h .text:004020DC test eax, eax .text:004020DE jnz short loc_40211B .text:004020E0 push offset aSignaturefile ; "signaturefile" .text:004020E5 push offset aCouldNotAuthen ; "Could not authenticate the %s file." .text:004020EA lea ecx, [ebp-68h] .text:004020ED push 64h .text:004020EF push ecx .text:004020F0 call sub_61C130 .text:004020F5 add esp, 10h .text:004020F8 push 0 .text:004020FA call sub_626460 .text:004020FF push 1 .text:00402101 push 0 .text:00402103 lea edx, [ebp-68h] .text:00402106 push edx .text:00402107 push 944h .text:0040210C push offset a_Client_cpp ; ".\Client.cpp" .text:00402111 push 4DCh .text:00402116 call sub_626720As you can clearly see I'm overwriting the line:Code:.text:00626460 ; ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦ S U B R O U T I N E ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦ .text:00626460 .text:00626460 ; Attributes: bp-based frame .text:00626460 .text:00626460 sub_626460 proc near ; CODE XREF: sub_402070+8Ap .text:00626460 ; sub_622630+18p ... .text:00626460 push ebp .text:00626461 mov ebp, esp .text:00626463 mov eax, [ebp+8] .text:00626466 mov dword_CC1A44, eax .text:0062646B pop ebp .text:0062646C retn 4 .text:0062646C sub_626460 endp .text:0062646C .text:0062646C ; ---------------------------------------------------------------------------
push 00
with:
push 01
But it doesn't seem to be having any effect, there is obviously something I'm missing, I shall take a deeper look.
P.S. I even confirmed I was overwriting the correct line and address my using Memory View in cheat engine.
Tried all 4 links, I can't seem to Download the .exes, It says The connection was reset trying to DL the live.exe
Turns out there was a second function I wasn't taking into consideration that were both calling the subroutine that reset the model edit variable. As you can see here:
Anyway, program has been updated to overwrite the code in the second function, it should work now, but as I said, I don't have an account I can use to test it.Code:.text:00622630 ; ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦ S U B R O U T I N E ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦ .text:00622630 .text:00622630 .text:00622630 sub_622630 proc near ; CODE XREF: sub_623FE0+277p .text:00622630 ; sub_6244A0+30Ep ... .text:00622630 lea eax, [edi+150h] .text:00622636 push eax .text:00622637 lea ecx, [edi+1FCh] .text:0062263D call sub_625900 .text:00622642 test al, al .text:00622644 jz short loc_622663 .text:00622646 push 0 .text:00622648 call sub_626460 .text:0062264D push 1 ; uExitCode .text:0062264F push 0 ; int .text:00622651 push 0 ; int .text:00622653 push 0FFFFFFFCh ; int .text:00622655 lea ecx, [edi+24h] .text:00622658 push ecx ; int .text:00622659 push 85100083h ; int .text:0062265E call sub_626720
So why my antivirus program was found a trojan inside this tool?
Really im not believe u =)
i like to old style sure blizz closed it but also they make more account stealing ways.
any1? any answer? also i cant post damn image hehe this forum needs 3 msg.
you're just too stupid to read existing posts.