Me and a few friends where having a huge argument on how hacks work. Some believe the hack runs through the exe where as others thought it was a different program all together and didn't need to run through the exe.
Do some run through exe and some don't or are we looking at this completely wrong.