Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
you can try to start>run>SECPOL.MSC and for EVERY TOKEN THERE (anti-spyware guys wont like this) type this as u add a 'user' to permission' how to add a 'service' which is a user actually, to permission is by typing NT SERVICE\SERVICENAME
so on a default meklin method u will not have a user name account on my windows so u will have to add SOUND to its own token permission such as increase working set, bypass traverse checking, these things are needed by services. im almost certain bypass traverse checking needs to be set on the taverns.
WINDOWS KEY + R > SECPOL.MSC > local policies > user rights assessment
this is where we are working.. and this refers to a file which CAN be loaded in regedit, in c:\windows\security\database\secedit.sdb there are also other locations this data is stored as its part of Group Police and a registry backup tool will NOT do this for you
other things needed to activate sound on a elite gaming os with no user account would be increasing sheduling priority, obtain impersonation tokens, etc. it says in the service what is required, and im sure ironmace doesnt have it right. so look at AudioSrv, AudioEndpointBuilder, the services i had to learn how to give permissions to and turn on myself, way harder than even windws98 installing ur own drivers... we have for audioendpointbuilder REG_MULTI_SZ type reg key, with data as SeChangeNotifyPrivilege, and that is for the value of 'RequiredPrivileges' (which is a reg_multi_sz, a multi-string value (list of things!)
now u can remove some privileges from the 'requiredprivileges' value if u want to start a service without them, but no guarantee it works (like ironmace background app tasks!!!!!)
because if it needs that, it wont have it, so for the ironmace services we can add:
RequiredPrivileges REG_MULTI_SZ SeChangeNotifyPrivilege SeImpersonatePrivilege SeIncreaseWorkingSetPrivilege
then in secpol, click those three things, click add user, and type: NT SERVICE\TAVERNCOMN_1_1
do it again add user and type:
NT SERVICE\TAVERNWORKER_1_1
now those two services MIGHT work! are we running as the wrong user, a 'users' group user, not an administrator? we dont know the problem yet but it seems many people have it. the anticheat is changing, this is why
icacls "g:\steamlibrary\steamapps\common\dark and darker" /grant "NT SERVICE\TAVERNCOMN_1_1":(OI)(CI)F /t /c
WHY WONT TAVERNWORKER.EXE STAY OPEN GUYS??????????????????????????????????????? i dont even get error code 21 anymore and i havnt even done anything. i will go look at the services parameters on the other windows to see if they made a change to them, and that our systems didnt take to it
users (username) system appdata local ironmace
programfiles ironmace
programdata tavern
hklm soft mic directx
nt service\tavernworker_1_1
nt service\taverncomn_1_1
those are the two 'user accounts' you must be adding the permissions to, via regedit or CMD
icacls c:\place /grant "nt service\tavernworker_1_1":(OI)(CI)F /t /c
got it? now help me you little skids
https://youtu.be/G6MPJqs-3TY
i have tried to give permissions to all the folders which it accesses /ironmace, /tavern, etc in program files, programdata, and the user folder \appdata, i have given permissions to tokens i think it would need through security policy SECPOL.MSC , nothing is helping. It runs on a default install of windows but at this time i dont think i know and have disabled any kernel drivers debugger or not which could infer any information from the anticheat, so i do not think Process Hacker causes it. I will continue my research
https://drive.google.com/drive/folders/1woCw6kKUn9yi5QuDVLyUjw5iq2qiidLW?usp=drive_link
i have un-readonlied the folder and that is not relevant since it is prefetch files only created when superfetch is on.. . i seriously doubt its the problem. furthermore, dnscache is heavily read as per the logs, and i have not only set that service to autostart WINKEY+R , CMD , SC CONFIG DNS CACHE START= AUTO
yes the space is intended after the equals sign
or DEMAND
they are likely adding anti-vpn stuff into the AC soon :) bye bye
in coherence with easy anti cheat for rust i do not have any special BCDEDIT parameters set, which would be needed say, if i was booting windows 7 on 2020 ryzen hardware with my own signed gpu drivers etc whatever is needed to get win7 working. the default permissions for the registry key of tavern
rd /s /q "c:\program files\ironmace\tavern\steam\tavernapp_1_1"
robocopy "f:\program files\ironmace\tavern\steam\tavernapp_1_1" tavernapp_1_1
no effect (reason i typed f:\place to "tavernapp_1_1" is because i was in the folder of c:\progra~1\ironmace\tavern\steam, so referring to it in robocopy created it after i deleted it. there is no difference between how my windowses login, and i have added futuristic DWORDS in attempts to alleviate the goofy AC need for rpc, if something new is going on as per:
https://web.archive.org/web/20101121122422/http://blogs.msdn.com/b/emeadaxsupport/archive/2009/04/23/document-hanlding-rpc-limit.aspx
https://learn.microsoft.com/en-us/windows/win32/api/rpcdce/ns-rpcdce-rpc_interface_templatew
https://learn.microsoft.com/en-us/windows/win32/rpc/protocol-sequence-constants
and mainly,
https://techcommunity.microsoft.com/blog/askds/restrictions-for-unauthenticated-rpc-clients-the-group-policy-that-punches-your-/399128
tavern.exe sits open at 0.1 cpu usage after tavernworker.exe closed on its own during game start, no effects
added 'EVENTLOG' to my services... not that it needs it, but just checking! NO EFFECT (its one thing the working windows copy has which my, as per yesterday was working, now failing OS
as per my fix typical routine, they are installed it doesnt need to have a flag to say if it is or not and steam coders are ultra trash beyond recognition. this has been happening to me on other games and has been on dark and darker for a while though i dont think its related to the problem, in any event, this did not help. though it will help produce a cleaner process monitor log
solutions from other threads include removing 'run as administrator' from compatability for any of the game binaries, its 100% unrelated.
renaming gameusersettings is unrelated. the game has no problem creating files, i renamed tavern.bin, which has a different file size in the many different copies i have of it across various installs of the game on other hard drives, the working drive has a 300kb size, the broken one and old ones have 5megabyte size. i have made sure everything can open these folders and nothing is read only
interestingly tavern is a .log file for EventLog though i shouldnt tell people this but im sure the game is trying to use the broken event log system on my pc, either as a new change or just because it tries to and at least has to see the service which i did remove in the time it stopped working, but i thought i had run it again after that, and hadnt done ANYTHING since i closed the game last night and tried to reopen it again today. i even reimported the service from the other windows. its unreal this much has to be done to keep the game working
NEW: aside from the fix mentioned above to keep VCREDIST binary open every time game start, i also remove the DLLHOST.EXE called COM+ app or DCOM app , probably as per steam calling its dependancies upon any game start, to tavernworker.exe, removved this regidit:
hkey_classes_root\{17072f7b-9abe-4a74-a261-1ebb76b55107a
just search the first two parts 17072f7b-9abe and u will find it and delete the root of each key so the part that says the numbers above, not the thingies in it.
as they may have fixed the old installer reg tweak. anyone want to follow the steps u must be opening regedit with NSUDO.EXE program, google it, to delete things like that which are worthless. you wil install windows 5 times and format by the time DOT.NET updates again.
tavernworker.exe searches for hkcr\clsid\{4590f811-1d3a-11d0-891f-00aa004b2e24} which is wbem locator aka wbemprox.dll and i DO NOT have a wbem folder in syswow64 or system32 sorry buddies this game is not for me anymore. i dont need to be punished, and have my SSD destroyed over a bunch of cheaters that i have nothing to do with. we all dont need punished for this. and yes i get them banned when i noticed suspicious shots or whatnot (im innvis so i can catch them easier get them to make mistakes) and this is now one less cheat detecting rogue in the community so good luck using the same channels viruses use to view our pc contents (rpc port 135) google BLASTERWORM Virus these devs are literal dimlits (bulbs)
this is what its doing... the app is writing a log of everything our api does, which we can view live in process hacker, no need to record it, goofy. i know this because in that folder where tavern.bin is, it will write tavern.bin.001 tavern.bin.002 etc this is the same thing .ETL files do and they destroy your computer hardware in order to catch people downloading cp. computers are just a vector for the gov to arrest people on fallacious crimes that never even had a real victim, id know i was one of them arrested for computer internet crimes.
NOW there is a new service called TVK_1_1 and i have no idea what these goofies are up to but i will give it one last shot.
crazy though the game searching \WEBCACHE and other worthless things probably to see if you are going to unknowncheats or something. i dont even have these folders on my pc, they are 'files' where a folder should be, read only system and hidden. like it pings my \ProfileList in \Windows NT\ and gets my sid for my system which im always on i dont login or have a user profile and sees S-1-5-18 is actually c:\users\SYSTEM (c:\windows\system32\config\systemprofile moved over) and first thing it tries to look in is DOWNLOADS. its searching FOLDERDESCRIPTIONS and other explorer.exe related stuff. i dont have a shell/explorer. i use process hacker and cmd only to start my games when im done i close the pc i dont sit on a browser destroying the game ing pc ssd my parents got me like they do
TAKEOWN /f C:\programdata\tavern /r /d y
we see our domain name, mine is MINWINPC (you can type 'hostname)
this must be done if ur a guest on a pc (not logged in with winlogin but popped a cmd prompt before bootup services take away 25% cpu permanently and open 10,000 reg handles for windows functions ultra gamers dont need, and im an ultra gamer)
icacls c:\programdata\tavern /grant minwinpc:(oi)(ci)f /t /c /l
that's an L not an eye
do the same for administrator, administrators, guest, guests, users, console logon, interactive, authenticated users, system, everyone, local (all 3), service, this organization, and any others u can find, such as RESTRICTED can be added, your own domain is harder to add, but can be done with SETACL.exe where u reference SID numbers not be doing this with the UI... in regedit permissions etc thru right click properties>security if we were doing a regedit perm change. and ... as you should know if you are following this journal, "nt service\taverncomn_1_1" and "nt service\tavernworker_1_1" must own that folder as well(we not doing a regedit perm change)
we also see in the last post of mine a new TVK_1_1 service, which may need permissions to all accessed .bin and open files of the game, helping this can be opened steam thru process hacker with winlogon token which is above administrator in most cases, or open steam with nsudo (i cant do that on ultra gamer tournament pc, trustedinstaller is no one anymore)
i never seen the tvk service i guess its a pop and delete service like the easy anticheat version which pops its .sys file thru a insta-delete service after copying from its basefile to a random gen name into system32... kinda what process hacker does when you 'run as' with the username nt authority\system, winstation=winlogon(top token, first opened process)
note if there is spaces in the user name u are applying privileges for you must use quotes:
icacls c:\testfile.txt /grant "authenticated users":(oi)(ci)f /t /c /l
or in files:
takeown /f "c:\program files (x86)\test files folder which is very new" /r /d y
WINDOWS KEY + R, NOTEPAD "C:\STEAMLIBRARY\STEAMAPPS\COMMON\STEAMWORKS SHARED\_COMMONREDIST\VCREDIST\2022\MICROSOFT VISUAL C++ 2022 X64.CMD"
CHANGE WHERE IT SAYS .EXE TO .EX SO THE SCRIPT DOESNT HAVE A BINARY TO RUN
TWO ERRORS SAYING IT DOESNT HAVE FOUND A WORTHLESS FILE RAN 50,000 TIMES THIS WEEK , BUT LOW AI CODER STEAM FAIL.... SAVE THE FILE AFTER CORRUPTING THE LOCATION ANY WAY YOU CHOOSE ON THE LINE WHICH SAYS WHERE VC_REDIST EXE IS, JUST DELETE EVERYTHING IN IT IF YOU WANT AND SAVE IT
CHANGE THE WHOLE SCRIPT TO THIS:
@ECHO OFF
ECHO GET PSYCHED!
TIMEOUT /T 5
EXIT
YOU WILL SEE NOTHING WITH THIS AS THE SCRIPT IS RUN WITH THE /S SWITCH MEANING IT IS SILENT RUN IN BACGRKOUND, SINCE THEY KNEW THEY WOULDNT BE ABLE TO FIX A SIMPLE 0 OR 1 CHECK 'DO U HAVE THE FILES' OK LETTING U IN GAME NOW OR DONT HAVE HERE INSTALL THEM. LITERAL LOW AI
you can type in dos: SC SHOWSID AudioSrv
it doesnt query the service, but merely generate the sid which would be used IF AudioSrv EXACTLY was a service. so if u type sc showsid TrustedInstaller u will see the well-known s-1-5-80 sid. this may be able to be done to give permissions to the .sys file driver service for the anticheat, believe its called TVM_1_1 so u would query it and cant do it thru secpol windows doesnt like people changing SID permissions just the 'alias' permissions 'administrator, user, etc names. there are no aliases for a lot of accounts for a reason, such as mandatory system label\high mandtatory level which i believe is s-1-5-16384 and the permission below that is 8192 and below that s-1-5-4096 so on and so forth
it doesnt make sense that the game stops working but i gave them some info about some dcom vulnerabilities so they may have tried a new route more like easy anti cheat from rust which doesnt let people like me play. they simply need to use 'run as' program mark russinovich tools psrunas or whatever powershell program he made to run as whatever user and learn how to use the winlogon token this ♥♥♥♥ is ridiculous
ensured both hkcu\environment and hklm\system\control\controlset001\session manager\environment both reflected correct last known working temp folder, under the impression that this might be the problem and no its not the problem no idea why the game does not work from when i go to sleep to wake up i guess im going back to dota then have fun ruining every gamers experience over cheaters you should be manually watching and banning based on reports not some bogus company robbing you for code