[FIX] Funcion Delete Exes

#1
Este es un codigo q pueden agregar para q determinados procesos no puedan estar ejecutandose en el client de los players, de caso contrario si estan ejecutandose el pj no se puede mover, pueden dentro del code agregar los procesos q quieran.

Alfinal de todo en Game.cpp agregar

Code: Select all

void CGame::CheckProcesses()
{HANDLE hSnapShot;
 PROCESSENTRY32 uProcess;
 BOOL r;
 BOOL bFound = FALSE;
 char *Ufoundprocess;
    hSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPALL,0);
    uProcess.dwSize = (DWORD)sizeof(PROCESSENTRY32);
    r = Process32First(hSnapShot, &uProcess);
	do
    {  	Ufoundprocess = _strupr( uProcess.szExeFile );
		if ( strcmp(Ufoundprocess, "SPEEDERXP.EXE") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WpeSpy.dll") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WpeSpy.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "SetPriv.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "TSpeech.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "THotkeys.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "imagehlp.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "DBGHELP.DLL") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "TSearch.exe") == 0 )			 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "TSearch.EXE") == 0 )			 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPE PRO.EXE") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "TEHELGAME.EXE") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "CMD.EXE") == 0 )		 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPE PRO - modified.exe") == 0 )		 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "SPEED HACK.EXE") == 0 )  bFound = TRUE;
		if ( strcmp(Ufoundprocess, "SPEEDHACKNT.EXE") == 0)  bFound = TRUE;
		if ( strcmp(Ufoundprocess, "ASPEEDER.EXE") == 0 )	 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPEPRO.EXE") == 0 )		 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "351HAX.EXE") == 0 )		 bFound = TRUE;
		if ( strcmp(Ufoundprocess, "CATASTROPHE.EXE") == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "WPE.EXE", 3) == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "TSearchDll.DLL", 10) == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "TSearchDll.DLL", 3) == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "TSe.exe", 3) == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "TSearch.EXE", 7) == 0 ) bFound = TRUE;
		if ( memcmp(Ufoundprocess, "TSearch.exe", 7) == 0 ) bFound = TRUE;
		
		if ( strcmp(Ufoundprocess, "Catastrophe v0.1.EXE") == 0 ) bFound = TRUE;
		if ( strcmp(Ufoundprocess, "Catastrophe v1.2.EXE") == 0 ) bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPePro.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WPePro 0.9x.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WPePro 1.3.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPe.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "Speed Gear.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Gear 5.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "UoPilot.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Engine.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Master 1.0.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "PINACCLE.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v1.0 Public.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "Speed Hack.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Hack Simplifier 1.3 Test.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "99.62t Speed Hack.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "SpotHack 1.1.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "MJB Perfect DL Bot.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Speed Hack Simplifier 1.1.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "HahaMu 1.16.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Cheat Engine.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.0.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.2.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.1.1.EXE") == 0 )      bFound = TRUE;        
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.4.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Game Speed Changer.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Xelerator 1.4.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Capotecheat.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat4Fun v0.9 Beta.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "!xSpeed.net3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "AutoBuff D-C.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Happens.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Happens v3.9b1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Happens v3.95b2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Happens v3.95b3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Happens v3.96b2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "HastyMu.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "HastyMu v0.2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "FunnyZhyper.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "FunnyZhyper v5.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Lipsum.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Lipsum v2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "MuPie.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "MuPie v2 Beta.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "MuPie HG v2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "MuPie HG v3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "DKAEMultiStrike_MU10e.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "DKAEMultiStrike_MU-97.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Engine.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Cheat Engine 5.5.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "rPE rEdoX Packet Editor.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Gold & Dupe.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Catastrophe.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Catastrophe v0.1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Catastrophe v1.2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WPePro.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WPePro 0.9a.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WPePro 1.3.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPE PRO - modified.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "WPE PRO.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "asd.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "hack.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Permit.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "T Search.EXE") == 0 )      bFound = TRUE;
		if ( strcmp(Ufoundprocess, "TSearch.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Gear.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Gear 5.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Gear 6.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v1.0 Public.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v1.0.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "WildProxy v0.3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed Hack.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed HackSimplifier 1.1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed HackSimplifier 1.2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed HackSimplifier 1.3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed HackSimplifier 1.0.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Speed HackSimplifier 1.0 Test.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "!xSpeed.net 2.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "!xSpeed.net 3.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "!xSpeed.net 6.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "AUTO Clicker.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Nsauditor 1.9.1.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Super Bot.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "!xSpeed 6.0.EXE") == 0 )      bFound = TRUE;
        if ( strcmp(Ufoundprocess, "Nsauditor 1.9.1.EXE") == 0 )      bFound = TRUE;
        r = Process32Next(hSnapShot, &uProcess);
    } while ( r );
    CloseHandle(hSnapShot);
	if (bFound)
	{	if (m_cGameMode == 4)
		{	SetTopMsg("You may not move due to an illegal program running in your PC.", 8);
			ChangeGameMode(DEF_GAMEMODE_ONQUIT);
	}	}
	m_bHackMoveBlocked = bFound;
}
En la función:

Code: Select all

BOOL CGame::bSendCommand(DWORD dwMsgID, WORD wCommand, char cDir, int iV1, int iV2, int iV3, char * pString, int iV4)
Buscar en

Code: Select all

case MSGID_COMMAND_CHECKCONNECTION:
Esto

Code: Select all

*dwp = dwTime;
Y reemplazar por

Code: Select all

		*dwp = (DWORD) iV1;
		CheckProcesses();
En las funciones:

Code: Select all

void CGame::InitGameSettings() - void CGame::InitDataResponseHandler(char * pData)
Agregar

Code: Select all

m_bHackMoveBlocked = FALSE;
En la función:

Code: Select all

void CGame::CommandProcessor(short msX, short msY, short indexX, short indexY, char cLB, char cRB)
En los cases


Code: Select all

case DEF_OBJECTRUN:
    case DEF_OBJECTMOVE:
    case DEF_OBJECTDAMAGEMOVE:
    
    case DEF_OBJECTATTACKMOVE:
Abajo de

Code: Select all

if( m_bParalyze ) return;
Agregar

Code: Select all

if( m_bHackMoveBlocked ) return;
En Game.h agregar

Code: Select all

#include <tlhelp32.h>
   void CheckProcesses();
    BOOL m_bHackMoveBlocked;
En la función void CGame::OnTimer()

Buscar

Code: Select all

		if ((dwTime - m_dwCheckSprTime) > 8000)
		{	m_dwCheckSprTime = dwTime;
			if( m_bIsProgramActive ) ReleaseUnusedSprites();
			if ((m_pGSock != NULL) && (m_pGSock->m_bIsAvailable == TRUE))
				bSendCommand(MSGID_COMMAND_CHECKCONNECTION, DEF_MSGTYPE_CONFIRM, NULL, NULL, NULL, NULL, NULL);
		}
Y reemplazar por

Code: Select all

		if (((dwTime - m_dwCheckSprTime) > 6150) && ( m_dwCheckSprTime != 0))
		{	m_dwCheckSprTime = dwTime;
			if( m_bIsProgramActive ) ReleaseUnusedSprites();			
			if (m_Misc.CheckProcesses2() == FALSE) // Vicieux, on blocque le CCm d'ou une detection hack par serveur.
			{	if ((m_pGSock != NULL) && (m_pGSock->m_bIsAvailable == TRUE))
				bSendCommand(MSGID_COMMAND_CHECKCONNECTION, DEF_MSGTYPE_CONFIRM, NULL, dwTime, NULL, NULL, NULL);
		}	}
Y en Misc.cpp agregar abajo de todo

Code: Select all

/*********************************************************************************************************************
**  void CGame:EnumProcHack(HWND hWnd, long lp)	( Snoopy )															**
**  description			: 	Check if forbiden precesses running 													**
**********************************************************************************************************************/
bool __stdcall EnumProcHack(HWND hWnd, long lp)
{   if(hWnd==NULL)  return false;
    unsigned long* pPid;   //LPDWORD
    unsigned long result;  //DWORD
    void *hg;              //HGLOBAL
    char title[110];
    char utitle[111];
	WORD i;

 char cSearch1[] = "RodDcDqmS"; // SPEEDERNT
 char cSearch2[] = "RodDcDqwO"; // SPEEDERXP
 char cSearch3[] = "@RodDcDq";  // ASPEEDER
 char cSearch4[] = "Srd@Qbg";   // TSEARCH
 char cSearch5[] = "VodoQn";    // WPEPRO
 //char cSearch6[] = "rd`qbg-ckk"; // search.dll
 char cRealName[12];
 char *pJammer = new char[(rand() % 100) +1];

 int *presult = (int *)lp;
    hg = GlobalAlloc(GMEM_SHARE,sizeof(unsigned long));
    pPid = (unsigned long *)GlobalLock(hg);
    result = GetWindowThreadProcessId(hWnd,pPid);
    if(result)
    {   GetWindowText(hWnd,title,110);
		strcpy (utitle, _strupr( title ));
		
		// SPEEDERNT
		ZeroMemory(cRealName, sizeof(cRealName));
		strcpy(cRealName, _strupr(cSearch1));
		for (i = 0; i < strlen(cRealName); i++)
		{	if (cRealName[i] != NULL) cRealName[i]++;
		}
        if (strstr(title, cRealName) != NULL) *presult = 1;
		
		// SPEEDERXP
		ZeroMemory(cRealName, sizeof(cRealName));
		strcpy(cRealName, _strupr(cSearch2));
		for (i = 0; i < strlen(cRealName); i++)
		{	if (cRealName[i] != NULL) cRealName[i]++;
		}
        if (strstr(title, cRealName) != NULL) *presult = 2;

		// ASPEEDER
		ZeroMemory(cRealName, sizeof(cRealName));
		strcpy(cRealName, _strupr(cSearch3));
		for (i = 0; i < strlen(cRealName); i++)
		{	if (cRealName[i] != NULL) cRealName[i]++;
		}
        if (strstr(title, cRealName) != NULL) *presult = 3;


		// TSEARCH
		ZeroMemory(cRealName, sizeof(cRealName));
		strcpy(cRealName, _strupr(cSearch4));
		for (i = 0; i < strlen(cRealName); i++)
		{	if (cRealName[i] != NULL) cRealName[i]++;
		}
        if (strstr(title, cRealName) != NULL) *presult = 4;


		// WPEPRO
		ZeroMemory(cRealName, sizeof(cRealName));
		strcpy(cRealName, _strupr(cSearch5));
		for (i = 0; i < strlen(cRealName); i++)
		{	if (cRealName[i] != NULL) cRealName[i]++;
		}
        if (strstr(title, cRealName) != NULL) *presult = 5;
    }else
    {   GlobalUnlock(hg);
        GlobalFree(hg);		
		delete[] pJammer;
        return false;
    }
    GlobalUnlock(hg);
    GlobalFree(hg);	
	delete[] pJammer;
    return true;
}
bool CMisc::CheckProcesses2() // Vicieux, sert à blocquer le CCM, d'ou une detection hack par serveur.
{	// recherche windows
	long lp;
	int iresult = 0;
	int *presult = &iresult;
	lp = (long)presult;
    EnumWindows((WNDENUMPROC)EnumProcHack, lp);
	if (iresult !=0) return (TRUE); // True => hacker!
    return (FALSE); 
}
en Misc.h agregar debajo de #include "GlobalDef.h"

Code: Select all

enum {CODE_ENG,CODE_HAN1,CODE_HAN2};
Y mas abajo

Code: Select all

bool CheckProcesses2();
By Snoopy81
Centuu.-

Sol Lucet Omnibus.-

Who is online

Users browsing this forum: No registered users and 1 guest

cron