Ok, I've installed the Aali's driver. The new version is a rip-off.
Here is the dump of the destination jump of the MDef fix (from Aali's):
Address Hex dump Command Comments
1004A190 8B4424 04 MOV EAX,DWORD PTR SS:[ESP+4]
1004A194 8B0D 485A0910 MOV ECX,DWORD PTR DS:[10095A48]
1004A19A 0FB69401 F8040000 MOVZX EDX,BYTE PTR DS:[EAX+ECX+4F8]
1004A1A2 A1 B85B0910 MOV EAX,DWORD PTR DS:[10095BB8]
1004A1A7 8B0490 MOV EAX,DWORD PTR DS:[EDX*4+EAX]
1004A1AA 8B5424 08 MOV EDX,DWORD PTR SS:[ESP+8]
1004A1AE 83FA 03 CMP EDX,3
1004A1B1 77 5D JA SHORT 1004A210
1004A1B3 FF2495 14A20410 JMP DWORD PTR DS:[EDX*4+1004A214]
1004A1BA 8B15 485C0910 MOV EDX,DWORD PTR DS:[10095C48]
1004A1C0 69C0 84000000 IMUL EAX,EAX,84
1004A1C6 0FBE4C08 70 MOVSX ECX,BYTE PTR DS:[ECX+EAX+70]
1004A1CB 6BC9 2C IMUL ECX,ECX,2C
1004A1CE 0FB64411 04 MOVZX EAX,BYTE PTR DS:[EDX+ECX+4]
1004A1D3 C3 RETN
1004A1D4 69C0 84000000 IMUL EAX,EAX,84
1004A1DA 0FBE4408 71 MOVSX EAX,BYTE PTR DS:[ECX+EAX+71]
1004A1DF 8B0D 4C5C0910 MOV ECX,DWORD PTR DS:[10095C4C]
1004A1E5 8D04C0 LEA EAX,[EAX*8+EAX]
1004A1E8 0FB64481 02 MOVZX EAX,BYTE PTR DS:[EAX*4+ECX+2]
1004A1ED C3 RETN
1004A1EE 833D 14CA0810 00 CMP DWORD PTR DS:[1008CA14],0
1004A1F5 74 19 JE SHORT 1004A210
1004A1F7 69C0 84000000 IMUL EAX,EAX,84
1004A1FD 0FBE4408 71 MOVSX EAX,BYTE PTR DS:[ECX+EAX+71]
1004A202 8D14C0 LEA EDX,[EAX*8+EAX]
1004A205 A1 4C5C0910 MOV EAX,DWORD PTR DS:[10095C4C]
1004A20A 0FB64490 03 MOVZX EAX,BYTE PTR DS:[EDX*4+EAX+3]
1004A20F C3 RETN
1004A210 33C0 XOR EAX,EAX
1004A212 C3 RETN
From dOTEMU:
Address Hex dump Command Comments
1000EB20 8B4424 04 MOV EAX,DWORD PTR SS:[ESP+4]
1000EB24 8B0D A4B00210 MOV ECX,DWORD PTR DS:[1002B0A4]
1000EB2A 0FB69401 F8040000 MOVZX EDX,BYTE PTR DS:[EAX+ECX+4F8]
1000EB32 A1 68B10210 MOV EAX,DWORD PTR DS:[1002B168]
1000EB37 8B0490 MOV EAX,DWORD PTR DS:[EDX*4+EAX]
1000EB3A 8B5424 08 MOV EDX,DWORD PTR SS:[ESP+8]
1000EB3E 83FA 03 CMP EDX,3
1000EB41 77 5D JA SHORT 1000EBA0
1000EB43 FF2495 A4EB0010 JMP DWORD PTR DS:[EDX*4+1000EBA4]
1000EB4A 8B15 74B10210 MOV EDX,DWORD PTR DS:[1002B174]
1000EB50 69C0 84000000 IMUL EAX,EAX,84
1000EB56 0FBE4C08 70 MOVSX ECX,BYTE PTR DS:[ECX+EAX+70]
1000EB5B 6BC9 2C IMUL ECX,ECX,2C
1000EB5E 0FB64411 04 MOVZX EAX,BYTE PTR DS:[EDX+ECX+4]
1000EB63 C3 RETN
1000EB64 69C0 84000000 IMUL EAX,EAX,84
1000EB6A 0FBE4408 71 MOVSX EAX,BYTE PTR DS:[ECX+EAX+71]
1000EB6F 8B0D 78B10210 MOV ECX,DWORD PTR DS:[1002B178]
1000EB75 8D04C0 LEA EAX,[EAX*8+EAX]
1000EB78 0FB64481 02 MOVZX EAX,BYTE PTR DS:[EAX*4+ECX+2]
1000EB7D C3 RETN
1000EB7E 833D 706E0210 00 CMP DWORD PTR DS:[10026E70],0
1000EB85 74 19 JE SHORT 1000EBA0
1000EB87 69C0 84000000 IMUL EAX,EAX,84
1000EB8D 0FBE4408 71 MOVSX EAX,BYTE PTR DS:[ECX+EAX+71]
1000EB92 8D14C0 LEA EDX,[EAX*8+EAX]
1000EB95 A1 78B10210 MOV EAX,DWORD PTR DS:[1002B178]
1000EB9A 0FB64490 03 MOVZX EAX,BYTE PTR DS:[EDX*4+EAX+3]
1000EB9F C3 RETN
1000EBA0 33C0 XOR EAX,EAX
1000EBA2 C3 RETN