Thanks for reporting that . Here is the "hot-fix":
1> Open conf64.txt (or conf.txt for 32 bits process).
2> Write the process exe name, e.g Process.exe, space and a ":" .
3> Write a space and anything before the ":". Obfuscation ignores this string.
Full example of a conf(64).txt:
Process.exe : D:/Path/Win/TestDLL/bin/TestDLL.dll
This is a bug and will be fixed on next version . What happened is that obfuscation doesn't save conf(64).txt prior relaunching the injector, so process name isn't know. I tested it always after using the usual injection, so conf(64).txt was always there . Aahaha oops
Another way to "fix" that is launching and injecting without obfuscation, so conf(64).txt will be wrote... yep
- - - Updated - - -
The game is 64 bits right? So the x64 version . You can always check which version is what, by trying to list the process inside the injector. The x32 version only sees 32 bits process and x64 only 64 bits process :}