Advertisement
Guest User

qProtect

a guest
May 20th, 2013
1,708
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C++ 3.60 KB | None | 0 0
  1. #ifdef __QUGET_NON_PROTECT_DLL_VERSION
  2. //Handle vars
  3. HANDLE HANDLE_QUGET_ANTI_PACKET = 0;
  4. HANDLE HANDLE_QUGET_ANTI_SPEED = 0;
  5. HANDLE HANDLE_QUGET_ANTI_WINM = 0;
  6. //Infiltration
  7. char orig3[5] = "";
  8. char tocheck3[5] = "";
  9. char orig4[5] = "";
  10. char tocheck4[5] = "";
  11. LPCSTR lpszMsg = NULL;
  12. void QUGET_ANTI_PACKET(void)
  13. {
  14.     char *tGTa = NULL;
  15.     char *tGTa2 = NULL;
  16.     while(!GetModuleHandle("Ws2_32.dll"))
  17.     {
  18.         Sleep(100);
  19.     }
  20.     HMODULE hMod = GetModuleHandle("Ws2_32.dll");
  21.     GetProcAddress(hMod, "send");
  22.     __asm mov tGTa, eax;
  23.     memcpy(orig3, tGTa, 5);
  24.  
  25.     GetProcAddress(hMod, "WSASend");
  26.     __asm mov tGTa2, eax;
  27.     memcpy(orig4, tGTa2, 5);
  28.     DWORD dwOld;
  29.     while(1)
  30.     {
  31.         if(WaitForSingleObject(HANDLE_QUGET_ANTI_SPEED, 0) == WAIT_OBJECT_0 ||
  32.            WaitForSingleObject(HANDLE_QUGET_ANTI_WINM, 0) == WAIT_OBJECT_0 )
  33.             {
  34.                 //ExitProcess(-1);
  35.                 lpszMsg = "Attempt to close a Q-Protect Thread.";
  36.             }
  37.         VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
  38.         memcpy(tocheck3, tGTa, 5);
  39.         if(strcmp(orig3,tocheck3) || orig3[0] == '\xE9' || tocheck3[0] == '\xE9')
  40.         {
  41.             //bAppExit = true;
  42.             lpszMsg = "Attempt to packet hack.";
  43.         }
  44.         VirtualProtect(tGTa, 5, dwOld, &dwOld);
  45.  
  46.         VirtualProtect(tGTa2, 5, PAGE_EXECUTE_READWRITE, &dwOld);
  47.         memcpy(tocheck4, tGTa2, 5);
  48.         if(strcmp(orig4,tocheck4) || orig4[0] == '\xE9' || tocheck4[0] == '\xE9')
  49.         {
  50.             lpszMsg = "Attempt to packet hack.";
  51.             //bAppExit = true;
  52.         }
  53.         VirtualProtect(tGTa2, 5, dwOld, &dwOld);
  54.         if( lpszMsg )
  55.         {
  56.             Error( "Q-Protect : %s .",lpszMsg );
  57.             //MessageBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
  58.             ExitProcess( -1 );
  59.         }
  60.         Sleep(3000);
  61.     }
  62. }
  63. //speed hacks
  64. char orig[5] = "";
  65. char tocheck[5] = "";
  66. void QUGET_ANTI_WINM(void)
  67. {
  68.     char *tGTa = NULL;
  69.     while(!GetModuleHandle("WINMM.dll"))
  70.     {
  71.         Sleep(100);
  72.     }
  73.     HMODULE hMod = GetModuleHandle("WINMM.dll");
  74.     GetProcAddress(hMod, "timeGetTime");
  75.     __asm mov tGTa, eax;
  76.     memcpy(orig, tGTa, 5);
  77.  
  78.  
  79.     DWORD dwOld;
  80.     while(1)
  81.     {
  82.         if(WaitForSingleObject(HANDLE_QUGET_ANTI_SPEED, 0) == WAIT_OBJECT_0 ||
  83.         WaitForSingleObject(HANDLE_QUGET_ANTI_PACKET, 0) == WAIT_OBJECT_0 )
  84.         {
  85.             lpszMsg = "Attempt to close a Q-Protect Thread.";
  86.         }
  87.         VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
  88.         memcpy(tocheck, tGTa, 5);
  89.         if(strcmp(orig,tocheck) || orig[0] == '\xE9' || tocheck[0] == '\xE9')
  90.         {
  91.             lpszMsg = "Attempt to speed hack.";
  92.         }
  93.         VirtualProtect(tGTa, 5, dwOld, &dwOld);
  94.         if( lpszMsg )
  95.         {
  96.             Error( "Q-Protect : %s .",lpszMsg );
  97.             //MessgeBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
  98.             ExitProcess( -1 );
  99.         }
  100.         Sleep(3000);
  101.     }
  102. }
  103. //Cheat engine
  104. char orig2[5] = "";
  105. char tocheck2[5] = "";
  106. void QUGET_ANTI_SPEED(void)
  107. {
  108.     char *tGTa = NULL;
  109.     while(!GetModuleHandle("kernel32.dll"))
  110.     {
  111.         Sleep(100);
  112.     }
  113.     HMODULE hKe = GetModuleHandle("kernel32.dll");
  114.     GetProcAddress(hKe, "QueryPerformanceCounter");
  115.     __asm mov tGTa, eax;
  116.     memcpy(orig2, tGTa, 5);
  117.     DWORD dwOld;
  118.     while(1)
  119.     {
  120.         if(WaitForSingleObject(HANDLE_QUGET_ANTI_PACKET, 0) == WAIT_OBJECT_0 ||
  121.            WaitForSingleObject(HANDLE_QUGET_ANTI_WINM, 0) == WAIT_OBJECT_0 )
  122.             {
  123.                 lpszMsg = "Attempt to close a Q-Protect Thread.";
  124.             }
  125.         VirtualProtect(tGTa, 5, PAGE_EXECUTE_READWRITE, &dwOld);
  126.         memcpy(tocheck2, tGTa, 5);
  127.         if(strcmp(orig2,tocheck2) || orig2[0] == '\xE9' || tocheck2[0] == '\xE9')
  128.         {
  129.             lpszMsg = "Attempt to speed hack.";
  130.         }
  131.         VirtualProtect(tGTa, 5, dwOld, &dwOld);
  132.         if( lpszMsg )
  133.         {
  134.             Error( "Q-Protect : %s .",lpszMsg );
  135.             //MessageBox( g_Neuz.GetSafeHwnd(), lpszMsg, "Q-Protect", MB_OK );
  136.             ExitProcess( -1 );
  137.         }
  138.         Sleep(3000);
  139.     }
  140. }
  141. #endif
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement