TQ's anti-bot system FULLY cracked.

06/27/2010 02:10 Lateralus#1
Working for Patch 5276.


If you don't want to get botjailed, use this.


What does this do?

1. It doesn't generate the plist file or gather information about your processes.
2. It protects against most (if not all) client disconnects.
3. It doesn't attempt to send information to TQ's servers. There is no need to use a firewall to block their IPs.
4. It no longer saves account information in the registry. (Thanks gabrola)
5. Removed CRC header checks.
6. Removed other window checks.

+ multiclient (with date and time), no popup on client close, run the executable directly, chattips removed, no away status, and anti-debugging techniques nerfed (for the most part).

How to Install:

Simply download the file below and replace the file in your Conquer folder with this one.



Download (+) - [Only registered and activated users can see links. Click Here To Register...]
06/27/2010 14:54 bgdu77#2
IF ive understand well
Its a craked conquer .exe with multiclient, no popup on client close, run the executable directly, and anti-debugging techniques nerfed
nothing els ?
06/27/2010 19:48 ernis007#3
can i ask, what for is a removed anti bot system cracked.exe , if there is no speed hacks, or other freebie bots working on this version? well okay, it got multiclient... but... ?
06/27/2010 20:40 gabrola#4
There's a whole bunch of other anti-bot functions in conquer.exe that were basically copied off of tqwea.dll not just the plist
06/27/2010 21:39 Lateralus#5
Quote:
Originally Posted by gabrola View Post
There's a whole bunch of other anti-bot functions in conquer.exe that were basically copied off of tqwea.dll not just the plist
Were you answering his question? Or did you mean that there's a whole bunch more that I haven't found?

Quote:
Originally Posted by bgdu77 View Post
IF ive understand well
Its a craked conquer .exe with multiclient, no popup on client close, run the executable directly, and anti-debugging techniques nerfed
nothing els ?
No, this should protect against getting botjailed (for the most part, if gabrola is talking to the other guy), unless someone videos you or reports you specifically to the GM.
06/27/2010 21:44 gabrola#6
Quote:
Originally Posted by Lateralus View Post
Were you answering his question? Or did you mean that there's a whole bunch more that I haven't found?
Yeah, there's a whole bunch you haven't found.
06/27/2010 21:52 Lateralus#7
Quote:
Originally Posted by gabrola View Post
Yeah, there's a whole bunch you haven't found.
Ah... Thanks, I'll take a look. So these anti-bot methods are copied from tqwea?

Although, it doesn't send any information (from what I see) to TQ's servers - unless it sends through the game server, which I doubt. Besides the client-kill (which I've fixed), what else am I looking for?
06/27/2010 22:43 gabrola#8
Quote:
Originally Posted by Lateralus View Post
Ah... Thanks, I'll take a look. So these anti-bot methods are copied from tqwea?

Although, it doesn't send any information (from what I see) to TQ's servers - unless it sends through the game server, which I doubt. Besides the client-kill (which I've fixed), what else am I looking for?
The client will search for hooks, check crc headers, check for proxies, lots of other stuff.

Anyway here are all of the functions tqwea.dll used to use (now in conquer.exe), I'll highlight some interesting ones you may look at.

Code:
> KERNEL32.dll: LocalAlloc, LeaveCriticalSection, TlsGetValue, EnterCriticalSection, GlobalReAlloc, GlobalHandle, InitializeCriticalSection, TlsAlloc, TlsSetValue, LocalReAlloc, DeleteCriticalSection, TlsFree, SetErrorMode, InterlockedIncrement, GlobalGetAtomNameA, GetFileAttributesA, lstrcmpW, GlobalFindAtomA, GlobalFlags, GetCPInfo, GetOEMCP, HeapFree, HeapAlloc, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetSystemTimeAsFileTime, VirtualAlloc, HeapReAlloc, InterlockedDecrement, GetProcessHeap, RtlUnwind, RaiseException, ExitProcess, HeapSize, GetACP, IsValidCodePage, LCMapStringA, LCMapStringW, HeapDestroy, HeapCreate, VirtualFree, GetStdHandle, GetTimeZoneInformation, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, SetStdHandle, GetConsoleCP, GetConsoleMode, GetLocaleInfoW, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetEnvironmentVariableA, GetModuleFileNameW, GlobalAddAtomA, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GetFullPathNameA, GetVolumeInformationA, FindClose, DuplicateHandle, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, GetThreadLocale, SetLastError, FormatMessageA, LocalFree, CompareStringA, GetVersion, lstrlenA, CompareStringW, InterlockedExchange, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, lstrcpyA, FindFirstFileA, Module32First, CreateToolhelp32Snapshot, GetCurrentProcessId, FindResourceA, LoadResource, LockResource, SizeofResource, QueryDosDeviceA, GetLogicalDriveStringsA, ReadFile, GetFileSize, GetSystemDirectoryA, GetModuleFileNameA, SetFilePointer, WinExec, FreeLibrary, GetModuleHandleA, GetCurrentProcess, DeleteFileA, IsBadReadPtr, GetProcAddress, GetVersionExA, LoadLibraryA, WideCharToMultiByte, CreateFileW, FileTimeToSystemTime, MultiByteToWideChar, FileTimeToLocalFileTime, GetFileTime, Process32Next, Process32First, WriteFile, GetLastError, UnmapViewOfFile, ReadProcessMemory, MapViewOfFile, VirtualAllocEx, CreateFileMappingA, IsDebuggerPresent, Module32Next, CreateFileA, OpenProcess, WaitForSingleObject, CreateThread, Sleep, GetTickCount, WritePrivateProfileStringA, CloseHandle, GetCommandLineA, GetPrivateProfileStringA

> USER32.dll: GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, ClientToScreen, ShowWindow, SetWindowTextA, RegisterWindowMessageA, LoadIconA, WinHelpA, GetCapture, SetPropA, GetPropA, RemovePropA, IsWindow, GetForegroundWindow, GetDlgItem, GetTopWindow, DestroyWindow, GetMessageTime, GetMessagePos, MapWindowPoints, SetForegroundWindow, GetMenu, GetClassInfoExA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetWindowRect, LoadCursorA, GetDC, ReleaseDC, GetSysColor, UnregisterClassA, [B][COLOR="Red"]UnhookWindowsHookEx[/COLOR][/B], GetLastActivePopup, IsWindowEnabled, EnableWindow, MessageBoxA, SetCursor, [B][COLOR="Red"]SetWindowsHookExA[/COLOR][/B], [B][COLOR="Red"]CallNextHookEx[/COLOR][/B], GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, PostMessageA, PostQuitMessage, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, ModifyMenuA, DestroyMenu, CreateWindowExA, EnableMenuItem, CheckMenuItem, GetSystemMetrics, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, CharUpperA, FindWindowExA, FindWindowA, GetClassLongA, GetClientRect, GetWindowLongA, GetParent, GetDesktopWindow, GetWindow, wsprintfW, [B][COLOR="Red"]EnumChildWindows[/COLOR][/B], GetWindowTextA, GetClassNameA, GetWindowThreadProcessId, [B][COLOR="Red"]EnumWindows[/COLOR][/B], SendMessageA, wsprintfA, GetSysColorBrush

> GDI32.dll: DeleteDC, GetStockObject, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, SetMapMode, RestoreDC, SaveDC, DeleteObject, SetBkColor, SetTextColor, GetClipBox, CreateBitmap

> comdlg32.dll: GetFileTitleA

> WINSPOOL.DRV: ClosePrinter, DocumentPropertiesA, OpenPrinterA

> ADVAPI32.dll: RegSetValueExA, RegCreateKeyExA, [B][COLOR="Red"]RegQueryValueA[/COLOR][/B], RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, [B][COLOR="Red"]RegOpenKeyA[/COLOR][/B], RegCloseKey, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken

> SHLWAPI.dll: PathStripToRootA, PathIsUNCA, PathFindExtensionA, PathFindFileNameA

> WININET.dll: [B][COLOR="Red"]InternetOpenA[/COLOR][/B], InternetGetConnectedState, [B][COLOR="Red"]InternetReadFile[/COLOR][/B], [B][COLOR="Red"]HttpOpenRequestA[/COLOR][/B], InternetConnectA, InternetCloseHandle, [B][COLOR="Red"]HttpSendRequestA[/COLOR][/B], HttpQueryInfoA

> VERSION.dll: GetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
06/28/2010 01:09 Lateralus#9
Thanks gabrola!

The hooking functions seem to be a part of the chat function. Some of these functions were fairly close to each other, and I bypassed them when tracing the calls.

It appears that it stores logged in accounts in the REGISTRY?! Whatever they're using that for, it no longer saves them.

I didn't happen to see any CRC header checks. If they're still getting executed, let me know.
06/28/2010 01:28 Lateralus#10
Sorry for double-post...

Updated. Report any client crashes or errors here.
06/28/2010 09:13 Pandora007#11
Hello Lateratus,

Can the multi have date and time please?
06/28/2010 09:18 elpop#12
thx bro
good job
06/28/2010 11:51 Lateralus#13
Quote:
Originally Posted by Pandora007 View Post
Hello Lateratus,

Can the multi have date and time please?
Done. Redownload the + version.
06/28/2010 17:38 ernis007#14
so basicly you can use any bots, that still works , without getting bot jailed? even auto clickers lol ? well then, thx , thats a good job, cheers
06/28/2010 20:59 macavladu#15
well dude i logged in 4 chars my archer and 2 water , put them on auto follow and on 1 of the waters there was away status.Should fix this and add more as wall jump etc :D