Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #ifdef __QUGET_NON_PROTECT_DLL_VERSION
- //Handle vars
- HANDLE HANDLE_QUGET_ANTI_PACKET = 0;
- HANDLE HANDLE_QUGET_ANTI_SPEED = 0;
- HANDLE HANDLE_QUGET_ANTI_WINM = 0;
- //Infiltration
- char orig3[5] = "";
- char tocheck3[5] = "";
- char orig4[5] = "";
- char tocheck4[5] = "";
- LPCSTR lpszMsg = NULL;
- void QUGET_ANTI_PACKET(void)
- {
- char *tGTa = NULL;
- char *tGTa2 = NULL;
- while(!GetModuleHandle("Ws2_32.dll"))
- {
- Sleep(100);
- }
- HMODULE hMod = GetModuleHandle("Ws2_32.dll");
- GetProcAddress(hMod, "send");
- __asm mov tGTa, eax;
- memcpy(orig3, tGTa, 5);
- GetProcAddress(hMod, "WSASend");
- __asm mov tGTa2, eax;
- memcpy(orig4, tGTa2, 5);
- DWORD dwOld;
- while(1)
- {
- if(WaitForSingleObject(HANDLE_QUGET_ANTI_SPEED, 0) == WAIT_OBJECT_0 ||
- WaitForSingleObject(HANDLE_QUGET_ANTI_WINM, 0) == WAIT_OBJECT_0 )
- {
- //ExitProcess(-1);
- lpszMsg = "Attempt to close a Q-Protect Thread.";
- }
- VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
- memcpy(tocheck3, tGTa, 5);
- if(strcmp(orig3,tocheck3) || orig3[0] == '\xE9' || tocheck3[0] == '\xE9')
- {
- //bAppExit = true;
- lpszMsg = "Attempt to packet hack.";
- }
- VirtualProtect(tGTa, 5, dwOld, &dwOld);
- VirtualProtect(tGTa2, 5, PAGE_EXECUTE_READWRITE, &dwOld);
- memcpy(tocheck4, tGTa2, 5);
- if(strcmp(orig4,tocheck4) || orig4[0] == '\xE9' || tocheck4[0] == '\xE9')
- {
- lpszMsg = "Attempt to packet hack.";
- //bAppExit = true;
- }
- VirtualProtect(tGTa2, 5, dwOld, &dwOld);
- if( lpszMsg )
- {
- Error( "Q-Protect : %s .",lpszMsg );
- //MessageBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
- ExitProcess( -1 );
- }
- Sleep(3000);
- }
- }
- //speed hacks
- char orig[5] = "";
- char tocheck[5] = "";
- void QUGET_ANTI_WINM(void)
- {
- char *tGTa = NULL;
- while(!GetModuleHandle("WINMM.dll"))
- {
- Sleep(100);
- }
- HMODULE hMod = GetModuleHandle("WINMM.dll");
- GetProcAddress(hMod, "timeGetTime");
- __asm mov tGTa, eax;
- memcpy(orig, tGTa, 5);
- DWORD dwOld;
- while(1)
- {
- if(WaitForSingleObject(HANDLE_QUGET_ANTI_SPEED, 0) == WAIT_OBJECT_0 ||
- WaitForSingleObject(HANDLE_QUGET_ANTI_PACKET, 0) == WAIT_OBJECT_0 )
- {
- lpszMsg = "Attempt to close a Q-Protect Thread.";
- }
- VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
- memcpy(tocheck, tGTa, 5);
- if(strcmp(orig,tocheck) || orig[0] == '\xE9' || tocheck[0] == '\xE9')
- {
- lpszMsg = "Attempt to speed hack.";
- }
- VirtualProtect(tGTa, 5, dwOld, &dwOld);
- if( lpszMsg )
- {
- Error( "Q-Protect : %s .",lpszMsg );
- //MessgeBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
- ExitProcess( -1 );
- }
- Sleep(3000);
- }
- }
- //Cheat engine
- char orig2[5] = "";
- char tocheck2[5] = "";
- void QUGET_ANTI_SPEED(void)
- {
- char *tGTa = NULL;
- while(!GetModuleHandle("kernel32.dll"))
- {
- Sleep(100);
- }
- HMODULE hKe = GetModuleHandle("kernel32.dll");
- GetProcAddress(hKe, "QueryPerformanceCounter");
- __asm mov tGTa, eax;
- memcpy(orig2, tGTa, 5);
- DWORD dwOld;
- while(1)
- {
- if(WaitForSingleObject(HANDLE_QUGET_ANTI_PACKET, 0) == WAIT_OBJECT_0 ||
- WaitForSingleObject(HANDLE_QUGET_ANTI_WINM, 0) == WAIT_OBJECT_0 )
- {
- lpszMsg = "Attempt to close a Q-Protect Thread.";
- }
- VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
- memcpy(tocheck2, tGTa, 5);
- if(strcmp(orig2,tocheck2) || orig2[0] == '\xE9' || tocheck2[0] == '\xE9')
- {
- lpszMsg = "Attempt to speed hack.";
- }
- VirtualProtect(tGTa, 5, dwOld, &dwOld);
- if( lpszMsg )
- {
- Error( "Q-Protect : %s .",lpszMsg );
- //MessageBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
- ExitProcess( -1 );
- }
- Sleep(3000);
- }
- }
- #endif
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement