No, they use Koem V1 atm.
And Koem V1 got send check. And this public bypass.
Code:
__declspec (naked) int __cdecl KoemSend(BYTE type , char* format, ...)
{
__asm push ebp
__asm mov ebp,esp
__asm mov ebp,esp
__asm push eax
__asm mov eax,4
__asm redo:
__asm add esp, -4092
__asm push eax
__asm dec eax
__asm jnz redo
__asm mov eax, dword ptr ss:[ebp-4]
__asm add esp, -44
__asm xor eax, eax
__asm mov dword ptr ss:[ebp-8], eax
//you can also sniff send here
//fake the caller (will be append to the packet and checked @ serverside)
__asm mov eax, 0x004921f9
__asm sub eax,5
__asm mov dword ptr ss:[ebp-4], eax
__asm jmp sendadr
/*
DWORD adr = ((*(DWORD*)(0x004921F4+1))+(0x004921F4+1)+4);
sendadr = adr+55;
*/
}
Just replace it in bloodx's soruce and add storm, gratz you have storm hack!.