From Build18019, Blizzard added a new detection method in the 32-bit client. A few days ago, they activated this dectection and put many accounts into ban-list whitch using “FrameScriptExecute” Bot.
Detection method here:
----------------------------------------------------
_lua_load[Wow.exe + 0x0B2223] is hooked with the function at HBDetectionLuaLoadHook[Wow.exe + 0x93514C]. It appears to check the call stack for calls coming from outside of Wow.exe, similar to the method that Blizzard tried a couple of years ago to detect Honorbuddy IIRC. The hook is applied by the function at HBDetectionPacketHandler[Wow.exe + 0x8DDD30]. It appears to be called in response to a packet send during or immediately after login.
Before Hook:
----------------------------------------------------
000B2223 - 55 - push ebp
000B2224 - 8b ec - mov ebp,esp
000B2226 - 83 ec 14 - sub esp,14
000B2229 - 83 7d 14 00 - cmp dword ptr [ebp+14],00
000B222D - 75 07 - jne 000B2236
000B222F - c7 45 14 9c 75 c3 01 - mov [ebp+14],getbattlenetallocator+2a1455
000B2236 - ff 75 10 - push [ebp+10]
000B2239 - 8d 45 ec - lea eax,[ebp-14]
000B223C - ff 75 0c - push [ebp+0c]
000B223F - 50 - push eax
000B2240 - ff 75 08 - push [ebp+08]
000B2243 - e8 d6 c1 00 00 - call 000Be41e
After Hook:
----------------------------------------------------
000B2223 - e9 24 2f 88 00 - jmp getbattlenetallocator+21f005
000B2228 - 14 83 - adc al,83
000B222A - 7d 14 - jnl 000B2240
000B222C - 00 75 07 - add [ebp+07],dh
000B222F - c7 45 14 9c 75 c3 01 - mov [ebp+14],getbattlenetallocator+2a1455
000B2236 - ff 75 10 - push [ebp+10]
000B2239 - 8d 45 ec - lea eax,[ebp-14]
000B223C - ff 75 0c - push [ebp+0c]
000B223F - 50 - push eax
000B2240 - ff 75 08 - push [ebp+08]
000B2243 - e8 d6 c1 00 00 - call 000Be41e
Key offsets here:
----------------------------------------------------
5.4.7.18019
0x0D75CE : _lua_load
0x8673BC : HBDetectionPacketHandler
0x8BD916 : HBDetectionLuaLoadHook
6.1.0.19702
0x0B2580 : _lua_load
0x8DA9FE : HBDetectionPacketHandler
0x9322E8 : HBDetectionLuaLoadHook
6.1.0.19865
0x0B2223 : _lua_load
0x8DDD30 : HBDetectionPacketHandler
0x93514C : HBDetectionLuaLoadHook
Ref: New 32-bit Detection Method Added
Possible Anti-Way Here:
----------------------------------------------------
Original Seq:
1、WoW.exe Startup
2、Account Loggined
3、Recieve HBDetectionPacket
4、Call HBDetectionPacketHandler
5、Call HBDetectionLuaLoadHook
6、_lua_load Hooked
7、Any Bot Call _lua_load outside WoW.exe, Hook _lua_load dectected
8、Report to blizz.
Anti Seq:
1、WoW.exe Startup - [Anti Step1] Hook HBDetectionPacketHandler
2、Account Loggined
3、Recieve HBDetectionPacket
4、Call HBDetectionPacketHandler - [Anti Step2] Call HBDetectionPacketHandler_Hooked, then call HBDetectionPacketHandler_Original
5、Call HBDetectionLuaLoadHook
6、_lua_load Hooked - [Anti Step3] Anter call HBDetectionPacketHandler_Original, unhook _lua_load
7、Any Bot Call _lua_load outside WoW.exe - [Anti Step4] Detection Failed
8、Report to blizz - [Anti Step5] It should never happend
Welcome any discution
Detection method here:
----------------------------------------------------
_lua_load[Wow.exe + 0x0B2223] is hooked with the function at HBDetectionLuaLoadHook[Wow.exe + 0x93514C]. It appears to check the call stack for calls coming from outside of Wow.exe, similar to the method that Blizzard tried a couple of years ago to detect Honorbuddy IIRC. The hook is applied by the function at HBDetectionPacketHandler[Wow.exe + 0x8DDD30]. It appears to be called in response to a packet send during or immediately after login.
Before Hook:
----------------------------------------------------
000B2223 - 55 - push ebp
000B2224 - 8b ec - mov ebp,esp
000B2226 - 83 ec 14 - sub esp,14
000B2229 - 83 7d 14 00 - cmp dword ptr [ebp+14],00
000B222D - 75 07 - jne 000B2236
000B222F - c7 45 14 9c 75 c3 01 - mov [ebp+14],getbattlenetallocator+2a1455
000B2236 - ff 75 10 - push [ebp+10]
000B2239 - 8d 45 ec - lea eax,[ebp-14]
000B223C - ff 75 0c - push [ebp+0c]
000B223F - 50 - push eax
000B2240 - ff 75 08 - push [ebp+08]
000B2243 - e8 d6 c1 00 00 - call 000Be41e
After Hook:
----------------------------------------------------
000B2223 - e9 24 2f 88 00 - jmp getbattlenetallocator+21f005
000B2228 - 14 83 - adc al,83
000B222A - 7d 14 - jnl 000B2240
000B222C - 00 75 07 - add [ebp+07],dh
000B222F - c7 45 14 9c 75 c3 01 - mov [ebp+14],getbattlenetallocator+2a1455
000B2236 - ff 75 10 - push [ebp+10]
000B2239 - 8d 45 ec - lea eax,[ebp-14]
000B223C - ff 75 0c - push [ebp+0c]
000B223F - 50 - push eax
000B2240 - ff 75 08 - push [ebp+08]
000B2243 - e8 d6 c1 00 00 - call 000Be41e
Key offsets here:
----------------------------------------------------
5.4.7.18019
0x0D75CE : _lua_load
0x8673BC : HBDetectionPacketHandler
0x8BD916 : HBDetectionLuaLoadHook
6.1.0.19702
0x0B2580 : _lua_load
0x8DA9FE : HBDetectionPacketHandler
0x9322E8 : HBDetectionLuaLoadHook
6.1.0.19865
0x0B2223 : _lua_load
0x8DDD30 : HBDetectionPacketHandler
0x93514C : HBDetectionLuaLoadHook
Ref: New 32-bit Detection Method Added
Possible Anti-Way Here:
----------------------------------------------------
Original Seq:
1、WoW.exe Startup
2、Account Loggined
3、Recieve HBDetectionPacket
4、Call HBDetectionPacketHandler
5、Call HBDetectionLuaLoadHook
6、_lua_load Hooked
7、Any Bot Call _lua_load outside WoW.exe, Hook _lua_load dectected
8、Report to blizz.
Anti Seq:
1、WoW.exe Startup - [Anti Step1] Hook HBDetectionPacketHandler
2、Account Loggined
3、Recieve HBDetectionPacket
4、Call HBDetectionPacketHandler - [Anti Step2] Call HBDetectionPacketHandler_Hooked, then call HBDetectionPacketHandler_Original
5、Call HBDetectionLuaLoadHook
6、_lua_load Hooked - [Anti Step3] Anter call HBDetectionPacketHandler_Original, unhook _lua_load
7、Any Bot Call _lua_load outside WoW.exe - [Anti Step4] Detection Failed
8、Report to blizz - [Anti Step5] It should never happend
Welcome any discution

Last edited: