I'm currently messing around with a dll, just a simple thing I created to try couple of things. I use an ud injector and it injects fine, however I stumble upon these annoying exception errors once I try any of the hotkeys in game (Exception code: C0000005 in msvcrt.dll) to be exact.
Currently I'm using virtual protect & memcpy to mess with the addies but I've tried other approaches as well, nothing works. Altough I spent some time researching on Hackshield, it's hard to find any more info besides that it hooks writeprocessmemory/readprocmem etc. So my question is, do I have to use detours or some sort of hooks to bypass this problem? I'm new at both of them so in that case, I would appreciate if I perhaps could get some pointers how to start off with it.
The reason I really wonder is because I have based my source on a pub warrock hack, that is only 1 month old and it seems to work without detours or other bypasses.
Sorry for posting in wrong section.
Lol I do know the original source I looked at comes from a WR hack, I'm not that stupid I think it would simply work by running it on CA without rewriting it.
The interesting stuff is that altough I haven't tried that hack myself it seems to be working for other people (and it did not include any bypass as I said), making me wonder whether it's really Hackshield that is the problem for me (warrock also uses hackshield as far as I know, shouldn't be any bigger differences between the HS versions right??).
There is. Its 2 completely different games. its like pb for bf2 and cod4. they look for different stuff. also the c++ code is calling and hooking process and functions and crap but its looking for the WR functions. it will not recognize the CA values and stuff.