Ancestors Legacy Message Board  STATUS: ACTIVE - Trainers are still being considered and updated for this title as patches are released. There is no guarantee that a trainer can be made or updated but it will be reviewed by our staff.

Our Ancestors Legacy Trainer is now available for version 64724 and supports STEAM, GOG. Our Ancestors Legacy message board is available to provide feedback on our trainers or cheats.
Ancestors Legacy Trainer
REQUEST MORE OPTIONS
0 option(s) for voting
FILE UPDATE REQUEST
1 report(s) filed
BOOST UPDATE PRIORITY
Boost currently not available
Message Board for PC version
Page 5 of 6   •  First Page  •  Previous Page  •   Next Page  •   Last Page
Signup or Login to Post
  Ancestors Legacy Trainer
  • Current rank: 1 Star. Next Rank at 100 Posts.
    Send a message to ZevLoveX
    ELITE
    ZevLoveX posted on Jul 02, 2020 2:58:09 AM - Report post
     
    I just can't seem to get the trainer to work when using super or normal health. The health of the units (greenbar) just remains the same.


    I hit the keybind, i mouse over the banner icon either on the bottom of the screen or on the game world but it just does nothing.
  • Premium Plus
    Send a message to PeterTheFish
    DEVILGRINDER
    PeterTheFish posted on Oct 11, 2020 3:58:58 PM - Report post
     
    quote:
    originally posted by ZevLoveX

    I just can't seem to get the trainer to work when using super or normal health. The health of the units (greenbar) just remains the same.


    I hit the keybind, i mouse over the banner icon either on the bottom of the screen or on the game world but it just does nothing.

    I get a different bgut similar problem.
    I use option 1, and even though I achieved all objectives, the timer continues and the mission end never arrives!
    I am locked in the scenario forever, without possibility to progress.

    Anybody else had this or found a walkaround for the problem?

  • Current rank: 1 Star. Next Rank at 100 Posts.
    Send a message to RoninCH
    ELITE
    RoninCH posted on Jan 06, 2021 8:06:56 AM - Report post
     
    Hello,
    I am using GOG the GOG Version 64724. For me Trainer is Working fine.
    Try this:
    Numpad 1: Units Have Super Health - move mouse over a unit card at the bottom of the screen, then you must press this key. This you have to do with all Cards. For me it works this Way.
    I was stuck in Mission 3 of the first Campaign. I missed the Archers the Mission gave me for going on in the mission. So i started Mission new, take the Archers with me and i can end the Mission. So you probarly missed something too.
    Greetz
  • Current rank: 1 Star. Next Rank at 100 Posts.
    Send a message to infinexus
    ELITE
    infinexus posted on Sep 25, 2021 4:31:11 PM - Report post
     
    I've been a satisfied CH user for nearly a decade - this is the first time a CH trainer has popped a virus warning that looks real.

    Tried to report malware and got sent to your VirusScan.jotti link - uploaded the Ancestors Legacy Trainer that CH created for me through that site and the file reported 4/14 scans reported malware:

    Status: Scan finished. 4/14 scanners reported malware.
    Scan taken on: September 26, 2021 at 1:18:16 AM GMT+2

    Norton caught the trainer creating several working files as well as a long list of registry edits (partial list below):

    Filename: ~cheathappenstrainer9993.tmp
    Threat name: SONAR.ProcHijack!g47Full Path: Not Available


    ~cheathappenstrainer9993.tmp Threat name: SONAR.ProcHijack!g47
    Locate
    Source: External Media
    File Actions
    File: c:\Users\HKEY_USER\cheathappens\work\runtime\ ~cheathappenstrainer9993.tmp No Action Required
    File: c:\Users\HKEY_USER\cheathappens\Debug\ ancestors legacy.debug Threat Removed
    File: c:\Users\HKEY_USER\cheathappens\Work\ help.txt Threat Removed
    File: c:\Users\HKEY_USER\cheathappens\Work\ s_68097_c.txt Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ trainer_troubleshooting_lite[1].asp Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ create-qr-code[1].png Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ trainer_troubleshooting_lite[1].htm Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ 0b84b562cb1f3d5bca0610d803819bbd600111c038f[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ bootstrap[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ aos[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ platform[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ popper.min[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ 17322734[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ all[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ uc[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ site[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\Content\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
    File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\MetaData\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ bootstrap[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ jquery-3.3.1[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ css[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ aos[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ platform[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ all[1].js Threat Removed
    Directory: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\ QQIC2SI1 Threat Removed
    ____________________________

    Registry Actions

    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_06CB&PID_CDAD\ DeviceInstances->5&16A0E943&0&0003:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_1122\ DeviceInstances->7&2D9BDD49&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0001:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0002:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&DC4DE3D&0&0001:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0003:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&16840E9C&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&3A5B4C5E&0&0002:..., Registry Hive: 64 bit Repair



  • Site Support
    Send a message to DragonStryder
    SITE SUPPORT
    DragonStryder posted on Sep 25, 2021 4:34:21 PM - Report post
     
    quote:
    originally posted by infinexus

    I've been a satisfied CH user for nearly a decade - this is the first time a CH trainer has popped a virus warning that looks real.

    Tried to report malware and got sent to your VirusScan.jotti link - uploaded the Ancestors Legacy Trainer that CH created for me through that site and the file reported 4/14 scans reported malware:

    Status: Scan finished. 4/14 scanners reported malware.
    Scan taken on: September 26, 2021 at 1:18:16 AM GMT+2

    Norton caught the trainer creating several working files as well as a long list of registry edits (partial list below):

    Filename: ~cheathappenstrainer9993.tmp
    Threat name: SONAR.ProcHijack!g47Full Path: Not Available


    ~cheathappenstrainer9993.tmp Threat name: SONAR.ProcHijack!g47
    Locate
    Source: External Media
    File Actions
    File: c:\Users\HKEY_USER\cheathappens\work\runtime\ ~cheathappenstrainer9993.tmp No Action Required
    File: c:\Users\HKEY_USER\cheathappens\Debug\ ancestors legacy.debug Threat Removed
    File: c:\Users\HKEY_USER\cheathappens\Work\ help.txt Threat Removed
    File: c:\Users\HKEY_USER\cheathappens\Work\ s_68097_c.txt Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ trainer_troubleshooting_lite[1].asp Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ create-qr-code[1].png Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ trainer_troubleshooting_lite[1].htm Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ 0b84b562cb1f3d5bca0610d803819bbd600111c038f[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ bootstrap[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ aos[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ platform[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ popper.min[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ 17322734[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ all[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\I5D14GJO\ uc[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ site[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\Content\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
    File: c:\Users\HKEY_USER\AppData\LocalLow\microsoft\cryptneturlcache\MetaData\ f07644e38ed7c9f37d11eec6d4335e02_3b9c2111eae052c5ba0ec1cbb6d70dea Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ bootstrap[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\7BAV0SGG\ jquery-3.3.1[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ css[1].css Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\QQIC2SI1\ aos[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ platform[1].js Threat Removed
    File: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\BEAYWFYW\ all[1].js Threat Removed
    Directory: c:\Users\HKEY_USER\AppData\Local\microsoft\Windows\inetcache\IE\ QQIC2SI1 Threat Removed
    ____________________________

    Registry Actions

    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_06CB&PID_CDAD\ DeviceInstances->5&16A0E943&0&0003:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_1122\ DeviceInstances->7&2D9BDD49&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0001:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0002:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&DC4DE3D&0&0001:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_045E&PID_07B2\ DeviceInstances->7&319C1BFF&0&0003:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&16840E9C&0&0000:..., Registry Hive: 64 bit Repaired
    Registry change: HKEY_USERS\S-1-5-21-1778698103-224403223-4197939508-1003\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\DirectInput\VID_1038&PID_202D\ DeviceInstances->3&3A5B4C5E&0&0002:..., Registry Hive: 64 bit Repair

    Our files are tested before we upload them to the website, the files are clean. more information here: Link
    Feel free to report them als false positives.

    CheatHappens Lead Help Desk & Support Engineer.
    CheatHappens Trainer Monkeys Project Lead.
  • Current rank: 1 Star. Next Rank at 100 Posts.
    Send a message to icednine
    ELITE
    icednine posted on Mar 27, 2023 1:56:02 PM - Report post
     
    The trainer worked fine for me the other day. Briefly lost power and went to restart everything only to have a .tmp file error when trying to run trainer again. I have rebooted, reinstalled, used CCleaner to wipte any garbage left behind, run as admin - nothing is working. TIA

  • Moderator
    Send a message to SmileyJ
    MODERATOR
    SmileyJ posted on Mar 27, 2023 2:40:31 PM - Report post
     
    quote:
    originally posted by icednine

    The trainer worked fine for me the other day. Briefly lost power and went to restart everything only to have a .tmp file error when trying to run trainer again. I have rebooted, reinstalled, used CCleaner to wipte any garbage left behind, run as admin - nothing is working. TIA

    .tmp fault means you AV has snagged something.

    Try to exclude these folders and files.

    C:\Users\USERNAMEHERE\Cheathappens\
    C:\ProgramData\CheatHappens
    C:\Users\USERNAMEHERE\AppData\Roaming\Cheat Happens\
    C:\Users\USERNAMEHERE\AppData\Local\Temp\CH_Temp.tmp
    C:\Users\USERNAMEHERE\AppData\Local\Temp~Mnn133.tmp
    C:\Users\USERNAMEHERE\AppData\Local\Temp~CheathappensTrainer.tmp

    Trainer Monkey June 2021 - Community Helper December 2021 - Community Mod March 2022 - CH Mod January 2023
    Forum rules. https://www.cheathappens.com/show_board2.asp?headID=144968&titleID=8463
  • Current rank: 1 Star. Next Rank at 100 Posts.
    Send a message to lztom
    ELITE
    lztom posted on Nov 26, 2023 11:57:13 AM - Report post
     
    Can i request this to be added to aurora?
Page 5 of 6   •  First Page  •  Previous Page  •   Next Page  •   Last Page
Signup or Login to Post
All times are (GMT -06:00) Central Time (US & Canada). Current time is 5:02:46 AM