| 1 | #include "Daodan_Patch.h" | 
 
 
 
 
 | 2 | #include "Daodan_Utility.h" | 
 
 
 
 
 | 3 | #include <beaengine/BeaEngine.h> | 
 
 
 
 
 | 4 |  | 
 
 
 
 
 | 5 | #include <windows.h> | 
 
 
 
 
 | 6 | #include <stdlib.h> | 
 
 
 
 
 | 7 | #include <string.h> | 
 
 
 
 
 | 8 |  | 
 
 
 
 
 | 9 | bool DDrPatch_MakeJump(void* from, void* to) | 
 
 
 
 
 | 10 | { | 
 
 
 
 
 | 11 | DWORD oldp; | 
 
 
 
 
 | 12 |  | 
 
 
 
 
 | 13 | if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 14 | { | 
 
 
 
 
 | 15 | *((unsigned char*)from) = 0xe9; // jmp rel32 | 
 
 
 
 
 | 16 | from = (char*)from + 1; | 
 
 
 
 
 | 17 | *(int*)from = (unsigned int)to - (unsigned int)from - 4; | 
 
 
 
 
 | 18 | VirtualProtect(from, 5, oldp, &oldp); | 
 
 
 
 
 | 19 | return true; | 
 
 
 
 
 | 20 | } | 
 
 
 
 
 | 21 | else | 
 
 
 
 
 | 22 | return false; | 
 
 
 
 
 | 23 | } | 
 
 
 
 
 | 24 |  | 
 
 
 
 
 | 25 | bool DDrPatch_MakeCall(void* from, void* to) | 
 
 
 
 
 | 26 | { | 
 
 
 
 
 | 27 | DWORD oldp; | 
 
 
 
 
 | 28 |  | 
 
 
 
 
 | 29 | if (VirtualProtect(from, 5, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 30 | { | 
 
 
 
 
 | 31 | *((unsigned char*)from) = 0xe8; // call rel32 | 
 
 
 
 
 | 32 | from = (char*)from + 1; | 
 
 
 
 
 | 33 | *(int*)from = (unsigned int)to - (unsigned int)from - 4; | 
 
 
 
 
 | 34 | VirtualProtect(from, 5, oldp, &oldp); | 
 
 
 
 
 | 35 | return true; | 
 
 
 
 
 | 36 | } | 
 
 
 
 
 | 37 | else | 
 
 
 
 
 | 38 | return false; | 
 
 
 
 
 | 39 | } | 
 
 
 
 
 | 40 |  | 
 
 
 
 
 | 41 | void* DDrPatch_MakeDetour(void* from, void* to) | 
 
 
 
 
 | 42 | { | 
 
 
 
 
 | 43 | int len = 0; | 
 
 
 
 
 | 44 | /* | 
 
 
 
 
 | 45 | DISASM MyDisasm; | 
 
 
 
 
 | 46 | int i = 0; | 
 
 
 
 
 | 47 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 48 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 49 |  | 
 
 
 
 
 | 50 | memset (&MyDisasm, 0, sizeof(DISASM)); | 
 
 
 
 
 | 51 | MyDisasm.EIP = (UIntPtr) from; | 
 
 
 
 
 | 52 | i = 0; | 
 
 
 
 
 | 53 | STARTUPMESSAGE("Orig before @ 0x%06x", from); | 
 
 
 
 
 | 54 | while (i<10){ | 
 
 
 
 
 | 55 | len = Disasm(&MyDisasm); | 
 
 
 
 
 | 56 | if (len != UNKNOWN_OPCODE) { | 
 
 
 
 
 | 57 | STARTUPMESSAGE("%s, Opcode: 0x%x, len: %d, branch: %d, to: 0x%06x", MyDisasm.CompleteInstr, MyDisasm.Instruction.Opcode, len, MyDisasm.Instruction.BranchType, MyDisasm.Instruction.AddrValue); | 
 
 
 
 
 | 58 | STARTUPMESSAGE("    Cat: 0x%04x, prefix count: %d", MyDisasm.Instruction.Category & 0xffff, MyDisasm.Prefix.Number ); | 
 
 
 
 
 | 59 | MyDisasm.EIP += (UIntPtr)len; | 
 
 
 
 
 | 60 | i++; | 
 
 
 
 
 | 61 | } | 
 
 
 
 
 | 62 | }; | 
 
 
 
 
 | 63 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 64 | */ | 
 
 
 
 
 | 65 |  | 
 
 
 
 
 | 66 | DISASM disasm; | 
 
 
 
 
 | 67 | memset(&disasm, 0, sizeof(DISASM)); | 
 
 
 
 
 | 68 | disasm.EIP = (UIntPtr) from; | 
 
 
 
 
 | 69 |  | 
 
 
 
 
 | 70 | char* trampoline = malloc(40); | 
 
 
 
 
 | 71 | DDrPatch_NOOP(trampoline, 40); | 
 
 
 
 
 | 72 | int pos = 0; | 
 
 
 
 
 | 73 | int branches = 0; | 
 
 
 
 
 | 74 |  | 
 
 
 
 
 | 75 | while (((void*)disasm.EIP - from) < 5) { | 
 
 
 
 
 | 76 | len = Disasm(&disasm); | 
 
 
 
 
 | 77 | if (len != UNKNOWN_OPCODE) { | 
 
 
 
 
 | 78 | if ((disasm.Instruction.Category & 0xffff) == CONTROL_TRANSFER) { | 
 
 
 
 
 | 79 | if (disasm.Prefix.Number > 0) { | 
 
 
 
 
 | 80 | STARTUPMESSAGE("Detour: Branch in trampoline area from address 0x%08x with prefixes", from); | 
 
 
 
 
 | 81 | return (void*)-1; | 
 
 
 
 
 | 82 | } | 
 
 
 
 
 | 83 | branches++; | 
 
 
 
 
 | 84 | int target = disasm.Instruction.AddrValue; | 
 
 
 
 
 | 85 | bool targetInTrampoline = ((void*)disasm.Instruction.AddrValue - from) < 5; | 
 
 
 
 
 | 86 | switch (disasm.Instruction.BranchType) { | 
 
 
 
 
 | 87 | case JmpType: | 
 
 
 
 
 | 88 | case CallType: | 
 
 
 
 
 | 89 | if (targetInTrampoline) { | 
 
 
 
 
 | 90 | int offset = disasm.Instruction.AddrValue - disasm.EIP; | 
 
 
 
 
 | 91 | if (disasm.Instruction.BranchType == JmpType) | 
 
 
 
 
 | 92 | DDrPatch_MakeJump(&trampoline[pos], &trampoline[pos]+offset); | 
 
 
 
 
 | 93 | else | 
 
 
 
 
 | 94 | DDrPatch_MakeCall(&trampoline[pos], &trampoline[pos]+offset); | 
 
 
 
 
 | 95 | } else { | 
 
 
 
 
 | 96 | if (disasm.Instruction.BranchType == JmpType) | 
 
 
 
 
 | 97 | DDrPatch_MakeJump(&trampoline[pos], (void*)target); | 
 
 
 
 
 | 98 | else | 
 
 
 
 
 | 99 | DDrPatch_MakeCall(&trampoline[pos], (void*)target); | 
 
 
 
 
 | 100 | } | 
 
 
 
 
 | 101 | pos += 5; | 
 
 
 
 
 | 102 | break; | 
 
 
 
 
 | 103 | case RetType: | 
 
 
 
 
 | 104 | case JECXZ: | 
 
 
 
 
 | 105 | memcpy(&trampoline[pos], (void*)disasm.EIP, len); | 
 
 
 
 
 | 106 | pos += len; | 
 
 
 
 
 | 107 | break; | 
 
 
 
 
 | 108 | // Opcode +1 | 
 
 
 
 
 | 109 | case JO: | 
 
 
 
 
 | 110 | case JC: | 
 
 
 
 
 | 111 | case JE: | 
 
 
 
 
 | 112 | case JNA: | 
 
 
 
 
 | 113 | case JS: | 
 
 
 
 
 | 114 | case JP: | 
 
 
 
 
 | 115 | case JL: | 
 
 
 
 
 | 116 | case JNG: | 
 
 
 
 
 | 117 | if (targetInTrampoline) { | 
 
 
 
 
 | 118 | memcpy(&trampoline[pos], (void*)disasm.EIP, len); | 
 
 
 
 
 | 119 | pos += len; | 
 
 
 
 
 | 120 | } else { | 
 
 
 
 
 | 121 | trampoline[pos++] = disasm.Instruction.Opcode + 1; | 
 
 
 
 
 | 122 | trampoline[pos++] = 5; | 
 
 
 
 
 | 123 | DDrPatch_MakeJump(&trampoline[pos], (void*)target); | 
 
 
 
 
 | 124 | pos += 5; | 
 
 
 
 
 | 125 | } | 
 
 
 
 
 | 126 | break; | 
 
 
 
 
 | 127 | // Opcode -1 | 
 
 
 
 
 | 128 | case JNO: | 
 
 
 
 
 | 129 | case JNC: | 
 
 
 
 
 | 130 | case JNE: | 
 
 
 
 
 | 131 | case JA: | 
 
 
 
 
 | 132 | case JNS: | 
 
 
 
 
 | 133 | case JNP: | 
 
 
 
 
 | 134 | case JNL: | 
 
 
 
 
 | 135 | case JG: | 
 
 
 
 
 | 136 | if (targetInTrampoline) { | 
 
 
 
 
 | 137 | memcpy(&trampoline[pos], (void*)disasm.EIP, len); | 
 
 
 
 
 | 138 | pos += len; | 
 
 
 
 
 | 139 | } else { | 
 
 
 
 
 | 140 | trampoline[pos++] = disasm.Instruction.Opcode - 1; | 
 
 
 
 
 | 141 | trampoline[pos++] = 5; | 
 
 
 
 
 | 142 | DDrPatch_MakeJump(&trampoline[pos], (void*)target); | 
 
 
 
 
 | 143 | pos += 5; | 
 
 
 
 
 | 144 | } | 
 
 
 
 
 | 145 | break; | 
 
 
 
 
 | 146 | default: | 
 
 
 
 
 | 147 | STARTUPMESSAGE("Detour: Unknown branch in trampoline area from address 0x%08x", from); | 
 
 
 
 
 | 148 | return (void*)-1; | 
 
 
 
 
 | 149 | } | 
 
 
 
 
 | 150 | } else { | 
 
 
 
 
 | 151 | memcpy(&trampoline[pos], (void*)disasm.EIP, len); | 
 
 
 
 
 | 152 | pos += len; | 
 
 
 
 
 | 153 | } | 
 
 
 
 
 | 154 | disasm.EIP += (UIntPtr)len; | 
 
 
 
 
 | 155 | } | 
 
 
 
 
 | 156 | else { | 
 
 
 
 
 | 157 | STARTUPMESSAGE("Detour: Unknown opcode in trampoline area from address 0x%08x", from); | 
 
 
 
 
 | 158 | return (void*)-1; | 
 
 
 
 
 | 159 | } | 
 
 
 
 
 | 160 | } | 
 
 
 
 
 | 161 |  | 
 
 
 
 
 | 162 | if (branches > 1) { | 
 
 
 
 
 | 163 | STARTUPMESSAGE("Detour: Too many branches in trampoline'd code from address 0x%08x: %d", from, branches); | 
 
 
 
 
 | 164 | return (void*)-1; | 
 
 
 
 
 | 165 | } | 
 
 
 
 
 | 166 |  | 
 
 
 
 
 | 167 |  | 
 
 
 
 
 | 168 | DDrPatch_MakeJump(&trampoline[pos], (void*)disasm.EIP); | 
 
 
 
 
 | 169 | DDrPatch_NOOP(from, (void*)disasm.EIP - from); | 
 
 
 
 
 | 170 |  | 
 
 
 
 
 | 171 | DWORD oldp; | 
 
 
 
 
 | 172 | if (!VirtualProtect(trampoline, 40, PAGE_EXECUTE_READWRITE, &oldp)) { | 
 
 
 
 
 | 173 | STARTUPMESSAGE("Detour: Could not mark page for trampoline as executable: from address 0x%08x", from); | 
 
 
 
 
 | 174 | return (void*)-1; | 
 
 
 
 
 | 175 | } | 
 
 
 
 
 | 176 | DDrPatch_MakeJump(from, to); | 
 
 
 
 
 | 177 | /* | 
 
 
 
 
 | 178 | memset (&MyDisasm, 0, sizeof(DISASM)); | 
 
 
 
 
 | 179 | MyDisasm.EIP = (UIntPtr) trampoline; | 
 
 
 
 
 | 180 | i = 0; | 
 
 
 
 
 | 181 | STARTUPMESSAGE("Trampoline @ 0x%06x", trampoline); | 
 
 
 
 
 | 182 | while (i<10){ | 
 
 
 
 
 | 183 | len = Disasm(&MyDisasm); | 
 
 
 
 
 | 184 | if (len != UNKNOWN_OPCODE) { | 
 
 
 
 
 | 185 | STARTUPMESSAGE("%s", MyDisasm.CompleteInstr); | 
 
 
 
 
 | 186 | MyDisasm.EIP += (UIntPtr)len; | 
 
 
 
 
 | 187 | i++; | 
 
 
 
 
 | 188 | } | 
 
 
 
 
 | 189 | }; | 
 
 
 
 
 | 190 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 191 |  | 
 
 
 
 
 | 192 | memset (&MyDisasm, 0, sizeof(DISASM)); | 
 
 
 
 
 | 193 | MyDisasm.EIP = disasm.EIP; | 
 
 
 
 
 | 194 | i = 0; | 
 
 
 
 
 | 195 | STARTUPMESSAGE("Orig after @ 0x%06x", disasm.EIP); | 
 
 
 
 
 | 196 | while (i<7){ | 
 
 
 
 
 | 197 | len = Disasm(&MyDisasm); | 
 
 
 
 
 | 198 | if (len != UNKNOWN_OPCODE) { | 
 
 
 
 
 | 199 | STARTUPMESSAGE("%s", MyDisasm.CompleteInstr); | 
 
 
 
 
 | 200 | MyDisasm.EIP += (UIntPtr)len; | 
 
 
 
 
 | 201 | i++; | 
 
 
 
 
 | 202 | } | 
 
 
 
 
 | 203 | }; | 
 
 
 
 
 | 204 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 205 |  | 
 
 
 
 
 | 206 | memset (&MyDisasm, 0, sizeof(DISASM)); | 
 
 
 
 
 | 207 | MyDisasm.EIP = (UIntPtr) from; | 
 
 
 
 
 | 208 | i = 0; | 
 
 
 
 
 | 209 | STARTUPMESSAGE("Orig start after @ 0x%06x", from); | 
 
 
 
 
 | 210 | while (i<3){ | 
 
 
 
 
 | 211 | len = Disasm(&MyDisasm); | 
 
 
 
 
 | 212 | if (len != UNKNOWN_OPCODE) { | 
 
 
 
 
 | 213 | STARTUPMESSAGE("%s", MyDisasm.CompleteInstr); | 
 
 
 
 
 | 214 | MyDisasm.EIP += (UIntPtr)len; | 
 
 
 
 
 | 215 | i++; | 
 
 
 
 
 | 216 | } | 
 
 
 
 
 | 217 | }; | 
 
 
 
 
 | 218 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 219 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 220 | STARTUPMESSAGE("", 0); | 
 
 
 
 
 | 221 | */ | 
 
 
 
 
 | 222 |  | 
 
 
 
 
 | 223 | return trampoline; | 
 
 
 
 
 | 224 | } | 
 
 
 
 
 | 225 |  | 
 
 
 
 
 | 226 | bool DDrPatch_String(char* dest, const unsigned char* string, int length) | 
 
 
 
 
 | 227 | { | 
 
 
 
 
 | 228 | DWORD oldp; | 
 
 
 
 
 | 229 |  | 
 
 
 
 
 | 230 | if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 231 | { | 
 
 
 
 
 | 232 | memcpy(dest, string, length); | 
 
 
 
 
 | 233 | VirtualProtect(dest, length, oldp, &oldp); | 
 
 
 
 
 | 234 | return true; | 
 
 
 
 
 | 235 | } | 
 
 
 
 
 | 236 | else | 
 
 
 
 
 | 237 | return false; | 
 
 
 
 
 | 238 | } | 
 
 
 
 
 | 239 |  | 
 
 
 
 
 | 240 | bool DDrPatch_Byte(char* dest, unsigned char value) | 
 
 
 
 
 | 241 | { | 
 
 
 
 
 | 242 | DWORD oldp; | 
 
 
 
 
 | 243 |  | 
 
 
 
 
 | 244 | if (VirtualProtect(dest, 1, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 245 | { | 
 
 
 
 
 | 246 | *dest = value; | 
 
 
 
 
 | 247 | VirtualProtect(dest, 1, oldp, &oldp); | 
 
 
 
 
 | 248 | return true; | 
 
 
 
 
 | 249 | } | 
 
 
 
 
 | 250 | else | 
 
 
 
 
 | 251 | return false; | 
 
 
 
 
 | 252 | } | 
 
 
 
 
 | 253 |  | 
 
 
 
 
 | 254 | bool DDrPatch_Int32(int* dest, unsigned int value) | 
 
 
 
 
 | 255 | { | 
 
 
 
 
 | 256 | DWORD oldp; | 
 
 
 
 
 | 257 |  | 
 
 
 
 
 | 258 | if (VirtualProtect(dest, 4, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 259 | { | 
 
 
 
 
 | 260 | *dest = value; | 
 
 
 
 
 | 261 | VirtualProtect(dest, 4, oldp, &oldp); | 
 
 
 
 
 | 262 | return true; | 
 
 
 
 
 | 263 | } | 
 
 
 
 
 | 264 | else | 
 
 
 
 
 | 265 | return false; | 
 
 
 
 
 | 266 | } | 
 
 
 
 
 | 267 |  | 
 
 
 
 
 | 268 | bool DDrPatch_Int16(short* dest, unsigned short value) | 
 
 
 
 
 | 269 | { | 
 
 
 
 
 | 270 | DWORD oldp; | 
 
 
 
 
 | 271 |  | 
 
 
 
 
 | 272 | if (VirtualProtect(dest, 2, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 273 | { | 
 
 
 
 
 | 274 | *dest = value; | 
 
 
 
 
 | 275 | VirtualProtect(dest, 2, oldp, &oldp); | 
 
 
 
 
 | 276 | return true; | 
 
 
 
 
 | 277 | } | 
 
 
 
 
 | 278 | else | 
 
 
 
 
 | 279 | return false; | 
 
 
 
 
 | 280 | } | 
 
 
 
 
 | 281 |  | 
 
 
 
 
 | 282 | bool DDrPatch__strdup(int* dest, const char* value) | 
 
 
 
 
 | 283 | { | 
 
 
 
 
 | 284 | DWORD oldp; | 
 
 
 
 
 | 285 |  | 
 
 
 
 
 | 286 | if (VirtualProtect(dest, 4, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 287 | { | 
 
 
 
 
 | 288 | *dest = (int)_strdup(value); | 
 
 
 
 
 | 289 | VirtualProtect(dest, 4, oldp, &oldp); | 
 
 
 
 
 | 290 | return true; | 
 
 
 
 
 | 291 | } | 
 
 
 
 
 | 292 | else | 
 
 
 
 
 | 293 | return false; | 
 
 
 
 
 | 294 | } | 
 
 
 
 
 | 295 |  | 
 
 
 
 
 | 296 | bool DDrPatch_NOOP(char* dest, unsigned int length) | 
 
 
 
 
 | 297 | { | 
 
 
 
 
 | 298 | DWORD oldp; | 
 
 
 
 
 | 299 |  | 
 
 
 
 
 | 300 | if (VirtualProtect(dest, length, PAGE_EXECUTE_READWRITE, &oldp)) | 
 
 
 
 
 | 301 | { | 
 
 
 
 
 | 302 | memset(dest, 0x90, length); | 
 
 
 
 
 | 303 | VirtualProtect(dest, length, oldp, &oldp); | 
 
 
 
 
 | 304 | return true; | 
 
 
 
 
 | 305 | } | 
 
 
 
 
 | 306 | else | 
 
 
 
 
 | 307 | return false; | 
 
 
 
 
 | 308 | } |