ahjkcfout7
Знающий
- Сообщения
- 26
- Репутация
- 6
Всем доброго времени суток. При написании кода столкнулся с такой непонятной штукой как запросы на сервера мелкософта. С чем это может быть связано? winxp autoit ver 3.3.12.0
запросы проходили через проксифайер
Код:
#include <process.au3>
#include <GUIConstantsEx.au3>
#include <APIConstants.au3>
#include <WinAPIEx.au3>
#include <array.au3>
;~ Sleep(2000)
HotKeySet("^q", "_Ctrl_Q")
$Win = GUICreate("", 200, 170, 200, 180, BitOR($WS_CAPTION, $WS_POPUP, $WS_SYSMENU), $WS_EX_DLGMODALFRAME)
_WinAPI_SetClassLongEx($Win, $GCL_HICONSM, 0)
_WinAPI_SetClassLongEx($Win, $GCL_HICON, 0)
GUICtrlCreateLabel("ON",10,13,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$on_hours=GUICtrlCreateInput(@HOUR,60, 10,35,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$on_mins=GUICtrlCreateInput(@MIN,120, 10,35,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$on_check=GUICtrlCreateCheckbox("",170,15,30,20)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
GUICtrlCreateLabel("OFF",10,63,35)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$off_hours=GUICtrlCreateInput(@HOUR,60, 60,35,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$off_mins=GUICtrlCreateInput(@MIN,120, 60,35,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$off_check=GUICtrlCreateCheckbox("",170,65,30,20)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$label=GUICtrlCreateLabel("", 30, 100, 170,30)
GUICtrlSetFont(-1,14, 100, 0, "Comic Sans MS")
$activate = GUICtrlCreateButton("activate", 13, 130, 170,30)
GUISetState(@SW_SHOW, $Win)
Asterios()
While True
Global $msg = GUIGetMsg()
Select
Case $msg = -3
Exit
Case $msg = $activate
_activate()
EndSelect
_check()
Sleep(100)
WEnd
Func _activate()
GUICtrlSetState($activate, $gui_disable)
While True
If GUICtrlRead($on_hours)= @HOUR And GUICtrlRead($on_mins)= @MIN And GUICtrlRead($on_check) = $GUI_CHECKED Then
ControlClick('[CLASS:WindowsForms10.Window.8.app.0.37a0697]','','[CLASS:WindowsForms10.BUTTON.app.0.37a0697; Text:Start Hotspot; INSTANCE:1]', 'left',2)
Sleep(60*2*1000)
_RunDos("netsh interface ip set address name='Беспроводное сетевое соединение 2' static 192.168.27.1 255.255.255.0")
ElseIf GUICtrlRead($off_hours)= @HOUR And GUICtrlRead($off_mins)= @MIN And GUICtrlRead($off_check) = $GUI_CHECKED Then
ControlClick('[CLASS:WindowsForms10.Window.8.app.0.37a0697]','','[CLASS:WindowsForms10.BUTTON.app.0.37a0697]', 'left',2)
Sleep(60*2*1000)
EndIf
Sleep(1000)
_check()
WEnd
EndFunc
Func _check()
If ControlGetText("[CLASS:WindowsForms10.Window.8.app.0.37a0697]","","[CLASS:WindowsForms10.BUTTON.app.0.37a0697]") = "Start Hotspot" Then
If Not GUICtrlRead($label)= "Wi-Fi is OFF now" Then GUICtrlSetData($label, "Wi-Fi is OFF now")
ElseIf ControlGetText("[CLASS:WindowsForms10.Window.8.app.0.37a0697]","","[CLASS:WindowsForms10.BUTTON.app.0.37a0697]") = "Stop Hotspot" Then
If Not GUICtrlRead($label)= "Wi-Fi is ON now" Then GUICtrlSetData($label, "Wi-Fi is ON now")
;~ GUICtrlSetData($label, "Wi-Fi is ON now")
EndIf
EndFunc
;~ ConsoleWrite(@HOUR &" "&@MIN)
;~ включить
;~ ControlClick('[CLASS:WindowsForms10.Window.8.app.0.37a0697]','','[CLASS:WindowsForms10.BUTTON.app.0.37a0697]', 'left',2)
;~ ====================
;~ выключить
;~ ControlClick('[CLASS:WindowsForms10.Window.8.app.0.37a0697]','','[CLASS:WindowsForms10.BUTTON.app.0.37a0697]', 'left',2)
;~ ====================
;~ _RunDos("netsh interface ip set address name="Беспроводное сетевое соединение 2" static 192.168.27.1 255.255.255.0")
Func _Ctrl_Q()
Exit 0
EndFunc ;==>_Ctrl_Q
Func Asterios()
$oRequest = ObjCreate('WinHttp.WinHttpRequest.5.1')
$oErrorHandler = ObjEvent('AutoIt.Error', 'ErrorFunc')
$oRequest.Open('POST', 'https://vk.com/wall[CENCORED]', 0)
$oRequest.Send("")
$oRequest.WaitForResponse
$sData = $oRequest.ResponseText
$oErrorHandler = 0 ;выключаем обработчик ошибок
;~ Return $sData
ConsoleWrite(@CR&$sData&@CRLF)
EndFunc
запросы проходили через проксифайер
[02.15 19:57:26] autoit3.exe (2464) - resolve vk.com : proxy
[02.15 19:57:26] autoit3.exe (2464) - resolve vk.com : proxy
[02.15 19:57:26] autoit3.exe (2464) - vk.com:443 matching autoit3.exe rule : using proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:27] autoit3.exe (2464) - vk.com:443 open through proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:27] autoit3.exe (2464) - vk.com:443 GetSockName : 127.0.0.1:49312
[02.15 19:57:29] autoit3.exe (2464) - resolve ctldl.windowsupdate.com : proxy
[02.15 19:57:29] autoit3.exe (2464) - resolve ctldl.windowsupdate.com : proxy
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 matching autoit3.exe rule : using proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 open through proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 GetSockName : 127.0.0.1:49315
[02.15 19:57:50] autoit3.exe (2464) - ctldl.windowsupdate.com:80 close, 195 bytes sent, 49953 bytes (48.7 KB) received, lifetime 00:21
[02.15 19:57:26] autoit3.exe (2464) - resolve vk.com : proxy
[02.15 19:57:26] autoit3.exe (2464) - vk.com:443 matching autoit3.exe rule : using proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:27] autoit3.exe (2464) - vk.com:443 open through proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:27] autoit3.exe (2464) - vk.com:443 GetSockName : 127.0.0.1:49312
[02.15 19:57:29] autoit3.exe (2464) - resolve ctldl.windowsupdate.com : proxy
[02.15 19:57:29] autoit3.exe (2464) - resolve ctldl.windowsupdate.com : proxy
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 matching autoit3.exe rule : using proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 open through proxy 127.0.0.1:9555 SOCKS5
[02.15 19:57:29] autoit3.exe (2464) - ctldl.windowsupdate.com:80 GetSockName : 127.0.0.1:49315
[02.15 19:57:50] autoit3.exe (2464) - ctldl.windowsupdate.com:80 close, 195 bytes sent, 49953 bytes (48.7 KB) received, lifetime 00:21