It's from the BlackMagic library, a class with some utility functions for Getting/Suspending threads.
It's from the BlackMagic library, a class with some utility functions for Getting/Suspending threads.
while I can't directly help... I can say that going down a similar path (pause/inject&execute/resume) only lead to tears and destruction.
Just get your DLL into wowz process and hook EndScene. way better.
HAX!
But in all seriousness I'm not that good. I cant even read assembly, let alone try to debug Wowz. But I know what you mean, I'm getting random DC's now (although I think it has something to do with writing my facing like, 100 times per second in some bits of my code =/ )
You should at least think about it. So many things are so much easier this way. It's easy enough to get your DLL injected (I just inject the same way you are... but inject a call to LoadLibrary my dll). And once you do that... pretty much everything is easier.
There is definately something to your theory here. I have a bot flying around looking for Everfrost Chips... and get DC'd every once in awhile when I try to "fight the bot" my manually adjusting directions. Dunno if its too many big jumps in facing or what.
Warden also monitors some offsets to detect patches 'n stuff, so you can get banned with a private bot/hack if you're patching offsets watched by warden, if you don't implement counter measures.
WoWX Hooks the Warden Doscann method and removes all patches befor it calls the original Doscann function and reapplies them afterwards, so all patches made by WoWX are invisible to the Warden, but if Blizzard implements a stack trace inside the Warden they would be able to check if doscann was hooked, by checking the adress that the call came from and I can't think of an easy way to hide the calling adress.
Last edited by Xarg0; 02-11-2009 at 07:28 PM. Reason: Edit: ****ing forum kept censoring my ****ing words
I hacked 127.0.0.1
Last edited by kynox; 02-11-2009 at 09:43 PM.