Official site anti-cheat Ultra Core Protector

Home Download F.A.Q. Addons Monitor Forum Support Advertise English version site UCP Anti-Cheat  Russian version site UCP Anti-Cheat
Ultra Core Protector - is the client-server anti-cheat freeware, for server protection from unscrupulous players.

Abilities Supported games  
Half-Life
Condition Zero
Counter-Strike 1.6
Day of Defeat
Adrenaline Gamer
Team Fortress Classic
Counter-Strike Source
MU Online
Ragnarok Online
Half-Life 2 Deathmatch
Adrenaline Gamer 2
Team Fortress 2
Battleye Detections

I’ve been reading about BE and how they detect some cheats etc, but I’m a little bit confused.

I made like a macro for PUBG where it captures the game screen and click in some coordinates using the WinAPI’s PrintWindow and PostMessage, it working good for like 2 weeks and I still safe, so I’m thinking to release it to the public, but I’m not sure if doing that they would block those WinAPI’s calls from my .exe

I always see people talking about injected DLL’s and hooking functions using them, but in this case I’m just doing a “[DllImport(“user32.dll”)]” in those 2 functions above, so I’m not sure if it’s hooking the functions on BE eyes or if it would be easier blocked.

Also, do they check like running process hash to compare them with some “cheat
hash list”? Like, making my macro public, they would be able to get my .exe and get its MD5 hash or whatever, but do they really do that?

All the code was made by myself, so how would they detect/block a cheat like this one?

Thank you all