|
|
|
|
#include "main.h"
|
|
|
|
|
#include <Windows.h>
|
|
|
|
|
#include <StrSafe.h>
|
|
|
|
|
#include <Shlwapi.h>
|
|
|
|
|
#include <iostream>
|
|
|
|
|
#include <fstream>
|
|
|
|
|
#include <iomanip>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <cstdint>
|
|
|
|
|
#include <string>
|
|
|
|
|
#include <sstream>
|
|
|
|
|
#include <memory>
|
|
|
|
|
|
|
|
|
|
extern cvar_t *random;
|
|
|
|
|
extern cvar_t *logsfiles;
|
|
|
|
|
TCHAR g_settingsFileName[MAX_PATH];
|
|
|
|
|
typedef void *HOOKSERVERMSG(const char *pszMsgName, void *pfnCallback);
|
|
|
|
|
void(*g_pfnCL_ParseConsistencyInfo)();
|
|
|
|
|
FILE *g_pFile;
|
|
|
|
|
extern int g_anticheckfiles;
|
|
|
|
|
extern char *g_anticheckfiles2[2048];
|
|
|
|
|
DWORD Original_ExecuteString;
|
|
|
|
|
|
|
|
|
|
bool ParseListx(const char *str) {
|
|
|
|
|
for (DWORD i = 0; i < g_anticheckfiles; i++) {
|
|
|
|
|
if (!_stricmp(str, g_anticheckfiles2[i])) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const char *StrStr_Hooked(char *str1, char *str2) {
|
|
|
|
|
if (ParseListx(str1)) {
|
|
|
|
|
if (logsfiles->value > 0) {
|
|
|
|
|
ConsolePrintColor(0, 255, 0, "[ADetect] Hide file - ");
|
|
|
|
|
ConsolePrintColor(205, 133, 63, _strdup(str1));
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "\n");
|
|
|
|
|
}
|
|
|
|
|
*(char *)&str1[strlen(str1) - 1] = -1;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
if (logsfiles->value > 0) {
|
|
|
|
|
ConsolePrintColor(205, 133, 63, _strdup(str1));
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "\n");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return strstr(str1, str2);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void CL_ParseConsistencyInfo() {
|
|
|
|
|
if (logsfiles->value > 0){
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "[Extra Mirror] Start CheckFileList:");
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "\n");
|
|
|
|
|
}
|
|
|
|
|
(*g_pfnCL_ParseConsistencyInfo)();
|
|
|
|
|
if (logsfiles->value > 0){
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "[Extra Mirror] End CheckFileList");
|
|
|
|
|
ConsolePrintColor(255, 255, 255, "\n");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#pragma comment(lib, "Shlwapi.lib")
|
|
|
|
|
cl_clientfunc_t *g_pClient = nullptr;
|
|
|
|
|
cl_enginefunc_t *g_pEngine = nullptr;
|
|
|
|
|
engine_studio_api_t *g_pStudio = nullptr;
|
|
|
|
|
|
|
|
|
|
cl_clientfunc_t g_Client;
|
|
|
|
|
cl_enginefunc_t g_Engine;
|
|
|
|
|
engine_studio_api_t g_Studio;
|
|
|
|
|
|
|
|
|
|
PUserMsg pUserMsgBase;
|
|
|
|
|
PEngineMsg pEngineMsgBase;
|
|
|
|
|
PEventMsg pEventMsgBase;
|
|
|
|
|
PColor24 Console_TextColor;
|
|
|
|
|
|
|
|
|
|
SCREENINFO g_Screen;
|
|
|
|
|
|
|
|
|
|
BYTE bPreType = 0;
|
|
|
|
|
|
|
|
|
|
ofstream logfile;
|
|
|
|
|
char* BaseDir;
|
|
|
|
|
|
|
|
|
|
DWORD WINAPI CheatEntry( LPVOID lpThreadParameter );
|
|
|
|
|
void ModuleLoaded();
|
|
|
|
|
DWORD WINAPI ProcessReload( LPVOID lpThreadParameter )
|
|
|
|
|
{
|
|
|
|
|
while ( true )
|
|
|
|
|
{
|
|
|
|
|
if ( FirstFrame )
|
|
|
|
|
{
|
|
|
|
|
offset.GetRenderType();
|
|
|
|
|
|
|
|
|
|
if ( !offset.GetModuleInfo() )
|
|
|
|
|
FirstFrame = false;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
CreateThread( 0 , 0 , CheatEntry , 0 , 0 , 0 );
|
|
|
|
|
ModuleLoaded();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Sleep( 100 );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
string szDirFile2(char* pszName){
|
|
|
|
|
string szRet = BaseDir;
|
|
|
|
|
return (szRet + pszName);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void HexReplaceInLibrary(std::string libraryPath, std::string hexSearch, std::string hexReplace) {
|
|
|
|
|
auto libraryAddress = GetModuleHandleA(libraryPath.c_str());
|
|
|
|
|
auto dosHeader = (IMAGE_DOS_HEADER *)libraryAddress;
|
|
|
|
|
auto peHeader = (IMAGE_NT_HEADERS *)((uintptr_t)libraryAddress + (uintptr_t)dosHeader->e_lfanew);
|
|
|
|
|
|
|
|
|
|
auto HexDigitToNum = [](char hexDigit) -> int { return ('0' <= hexDigit && hexDigit <= '9') ? (hexDigit - '0') : ((hexDigit - 'A') + 10); };
|
|
|
|
|
|
|
|
|
|
auto searchSize = hexSearch.length() / 2;
|
|
|
|
|
|
|
|
|
|
auto search = std::make_unique<byte[]>(searchSize);
|
|
|
|
|
for (size_t i = 0; i < searchSize; i++) {
|
|
|
|
|
search[i] = ((byte)HexDigitToNum(hexSearch[2 * i]) << 4) | ((byte)HexDigitToNum(hexSearch[2 * i + 1]));
|
|
|
|
|
}
|
|
|
|
|
auto replace = std::make_unique<byte[]>(searchSize);
|
|
|
|
|
for (size_t i = 0; i < searchSize; i++) {
|
|
|
|
|
replace[i] = ((byte)HexDigitToNum(hexReplace[2 * i]) << 4) | ((byte)HexDigitToNum(hexReplace[2 * i + 1]));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
auto codeBase = (uintptr_t)libraryAddress + peHeader->OptionalHeader.BaseOfCode;
|
|
|
|
|
auto codeSize = peHeader->OptionalHeader.SizeOfCode;
|
|
|
|
|
auto codeEnd = codeBase + codeSize;
|
|
|
|
|
auto codeSearchEnd = codeEnd - searchSize + 1;
|
|
|
|
|
|
|
|
|
|
for (auto codePtr = codeBase; codePtr < codeSearchEnd; codePtr++) {
|
|
|
|
|
if (memcmp((const void *)codePtr, search.get(), searchSize) == 0) {
|
|
|
|
|
DWORD oldProt;
|
|
|
|
|
VirtualProtect((LPVOID)codePtr, searchSize, PAGE_EXECUTE_READWRITE, &oldProt);
|
|
|
|
|
memcpy((void *)codePtr, replace.get(), searchSize);
|
|
|
|
|
// wanna nullptr here
|
|
|
|
|
VirtualProtect((LPVOID)codePtr, searchSize, oldProt, &oldProt);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
DWORD WINAPI CheatEntry( LPVOID lpThreadParameter )
|
|
|
|
|
{
|
|
|
|
|
static HANDLE hProcessReloadThread = 0;
|
|
|
|
|
|
|
|
|
|
if ( hProcessReloadThread )
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
TerminateThread( hProcessReloadThread , 0 );
|
|
|
|
|
CloseHandle( hProcessReloadThread );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BYTE counter_find = 0;
|
|
|
|
|
|
|
|
|
|
start_hook:
|
|
|
|
|
|
|
|
|
|
if ( counter_find == 100 )
|
|
|
|
|
{
|
|
|
|
|
offset.Error(ERROR_FIND);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Sleep( 100 );
|
|
|
|
|
counter_find++;
|
|
|
|
|
|
|
|
|
|
if ( !offset.GetModuleInfo() )
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
DWORD ClientTable = offset.FindClientTable();
|
|
|
|
|
|
|
|
|
|
if ( ClientTable )
|
|
|
|
|
{
|
|
|
|
|
g_pClient = (cl_clientfunc_t*)ClientTable;
|
|
|
|
|
offset.CopyClient();
|
|
|
|
|
|
|
|
|
|
if ( (DWORD)g_Client.Initialize )
|
|
|
|
|
{
|
|
|
|
|
DWORD EngineTable = offset.FindEngineTable();
|
|
|
|
|
|
|
|
|
|
if ( EngineTable )
|
|
|
|
|
{
|
|
|
|
|
g_pEngine = (cl_enginefunc_t*)EngineTable;
|
|
|
|
|
offset.CopyEngine();
|
|
|
|
|
|
|
|
|
|
if ( (DWORD)g_Engine.V_CalcShake )
|
|
|
|
|
{
|
|
|
|
|
DWORD StudioTable = offset.FindStudioTable();
|
|
|
|
|
|
|
|
|
|
if ( StudioTable )
|
|
|
|
|
{
|
|
|
|
|
g_pStudio = (engine_studio_api_t*)StudioTable;
|
|
|
|
|
offset.CopyStudio();
|
|
|
|
|
|
|
|
|
|
if ( (DWORD)g_Studio.StudioSetupSkin )
|
|
|
|
|
{
|
|
|
|
|
while ( !FirstFrame )
|
|
|
|
|
{
|
|
|
|
|
HookFunction();
|
|
|
|
|
Sleep( 100 );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bPreType = offset.HLType;
|
|
|
|
|
|
|
|
|
|
hProcessReloadThread = CreateThread( 0 , 0 , ProcessReload , 0 , 0 , 0 );
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
goto start_hook;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
class BinaryPattern {
|
|
|
|
|
uint8_t *pBytes;
|
|
|
|
|
bool *pMarks;
|
|
|
|
|
size_t byteCount;
|
|
|
|
|
public:
|
|
|
|
|
BinaryPattern(const char *str) {
|
|
|
|
|
size_t elemCount = strlen(str) / 2 + 1;
|
|
|
|
|
pBytes = (decltype(pBytes))malloc(elemCount * sizeof(*pBytes));
|
|
|
|
|
pMarks = (decltype(pMarks))malloc(elemCount * sizeof(*pMarks));
|
|
|
|
|
|
|
|
|
|
byteCount = 0;
|
|
|
|
|
for (const char *pch = str; *pch != '\0'; pch++) {
|
|
|
|
|
if (*pch == ' ') {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
if (*pch == '?') {
|
|
|
|
|
pBytes[byteCount] = 0;
|
|
|
|
|
pMarks[byteCount] = false;
|
|
|
|
|
byteCount++;
|
|
|
|
|
|
|
|
|
|
if (*(pch + 1) == '?') {
|
|
|
|
|
pch++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pBytes[byteCount] = strtoul(pch, nullptr, 16);
|
|
|
|
|
pMarks[byteCount] = true;
|
|
|
|
|
byteCount++;
|
|
|
|
|
|
|
|
|
|
pch++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pBytes = (decltype(pBytes))realloc(pBytes, byteCount * sizeof(*pBytes));
|
|
|
|
|
pMarks = (decltype(pMarks))realloc(pMarks, byteCount * sizeof(*pMarks));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool IsMatch(uintptr_t ptr) {
|
|
|
|
|
uint8_t *pBytesToCheck = (decltype(pBytesToCheck))ptr;
|
|
|
|
|
|
|
|
|
|
for (size_t i = 0; i < byteCount; i++) {
|
|
|
|
|
if (pMarks[i] && pBytesToCheck[i] != pBytes[i]) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
class JmpOpcode {
|
|
|
|
|
public:
|
|
|
|
|
static void Setup(uintptr_t jmpPtr, uintptr_t destPtr) {
|
|
|
|
|
DWORD oldProt;
|
|
|
|
|
VirtualProtect(LPVOID(jmpPtr), sizeof(uint8_t) + sizeof(intptr_t), PAGE_EXECUTE_READWRITE, &oldProt);
|
|
|
|
|
|
|
|
|
|
*(uint8_t *)jmpPtr = 0xE9;
|
|
|
|
|
*(intptr_t *)(jmpPtr + sizeof(uint8_t)) = (intptr_t)destPtr - ((intptr_t)jmpPtr + 5);
|
|
|
|
|
|
|
|
|
|
VirtualProtect(LPVOID(jmpPtr), sizeof(uint8_t) + sizeof(intptr_t), oldProt, &oldProt);
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
class CallOpcode {
|
|
|
|
|
public:
|
|
|
|
|
static uintptr_t GetDestination(uintptr_t callPtr) {
|
|
|
|
|
return (intptr_t)(callPtr + 5) + *(intptr_t *)(callPtr + 1);
|
|
|
|
|
//return (callPtr + 5) + *(intptr_t *)(callPtr + 1);
|
|
|
|
|
}
|
|
|
|
|
static void SetDestination(uintptr_t callPtr, uintptr_t destPtr) {
|
|
|
|
|
DWORD oldProt;
|
|
|
|
|
VirtualProtect(LPVOID(callPtr + 1), sizeof(intptr_t), PAGE_EXECUTE_READWRITE, &oldProt);
|
|
|
|
|
|
|
|
|
|
*(intptr_t *)(callPtr + 1) = destPtr - (callPtr + 5);
|
|
|
|
|
|
|
|
|
|
VirtualProtect(LPVOID(callPtr + 1), sizeof(intptr_t), oldProt, &oldProt);
|
|
|
|
|
}
|
|
|
|
|
static void SetDestination(uintptr_t callPtr, void *destPtr) {
|
|
|
|
|
SetDestination(callPtr, (uintptr_t)destPtr);
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
class Module {
|
|
|
|
|
uintptr_t moduleBase;
|
|
|
|
|
IMAGE_NT_HEADERS32 *pNtHeaders;
|
|
|
|
|
public:
|
|
|
|
|
Module(const char *moduleName) {
|
|
|
|
|
moduleBase = (decltype(moduleBase))GetModuleHandleA(moduleName);
|
|
|
|
|
|
|
|
|
|
IMAGE_DOS_HEADER *pDosHeader = (decltype(pDosHeader))moduleBase;
|
|
|
|
|
pNtHeaders = (decltype(pNtHeaders))(moduleBase + pDosHeader->e_lfanew);
|
|
|
|
|
}
|
|
|
|
|
static bool IsLoaded(const char *moduleName) {
|
|
|
|
|
return GetModuleHandleA(moduleName) != nullptr;
|
|
|
|
|
}
|
|
|
|
|
uintptr_t FindStringAddress(const char *str) const {
|
|
|
|
|
const char *pData = (decltype(pData))(moduleBase + pNtHeaders->OptionalHeader.BaseOfData);
|
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
if (!strcmp(pData, str)) {
|
|
|
|
|
return (uintptr_t)pData;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pData++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (uintptr_t)nullptr;
|
|
|
|
|
}
|
|
|
|
|
uintptr_t FindFirstUseOfString(const char *str) const {
|
|
|
|
|
uintptr_t strPtr = FindStringAddress(str);
|
|
|
|
|
|
|
|
|
|
IMAGE_BASE_RELOCATION *pBaseReloc = (decltype(pBaseReloc))(moduleBase + pNtHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_BASERELOC].VirtualAddress);
|
|
|
|
|
uintptr_t relocBase = (decltype(relocBase))pBaseReloc;
|
|
|
|
|
|
|
|
|
|
while (pBaseReloc->SizeOfBlock) {
|
|
|
|
|
uint16_t *pEnd = (decltype(pEnd))(relocBase + pBaseReloc->SizeOfBlock);
|
|
|
|
|
uintptr_t base = (decltype(base))(moduleBase + pBaseReloc->VirtualAddress);
|
|
|
|
|
|
|
|
|
|
for (uint16_t *pReloc = (decltype(pReloc))(relocBase + sizeof(*pBaseReloc)); pReloc != pEnd; pReloc++) {
|
|
|
|
|
if (*pReloc >> 12 == 0) { // Bad type
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
uintptr_t ptr = base + (*pReloc & 0xFFF); // Offset
|
|
|
|
|
if (strPtr == *(uintptr_t *)ptr) {
|
|
|
|
|
return ptr;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pBaseReloc = (decltype(pBaseReloc))pEnd;
|
|
|
|
|
relocBase = (decltype(relocBase))pBaseReloc;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (uintptr_t)nullptr;
|
|
|
|
|
}
|
|
|
|
|
uintptr_t SearchUpForBinaryPattern(uintptr_t startPtr, BinaryPattern &binPattern) const {
|
|
|
|
|
uintptr_t ptr = startPtr;
|
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
if (binPattern.IsMatch(ptr)) {
|
|
|
|
|
return ptr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ptr--;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (uintptr_t)nullptr;
|
|
|
|
|
}
|
|
|
|
|
uintptr_t SearchDownForFirstCallToFunction(uintptr_t startPtr, uintptr_t funcPtr) {
|
|
|
|
|
uintptr_t ptr = startPtr;
|
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
if (*(uint8_t *)ptr == 0xE8 && CallOpcode::GetDestination(ptr) == funcPtr) {
|
|
|
|
|
return ptr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ptr++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (uintptr_t)nullptr;
|
|
|
|
|
}
|
|
|
|
|
uintptr_t SearchUpForFirstCallToFunction(uintptr_t startPtr, uintptr_t funcPtr) {
|
|
|
|
|
uintptr_t ptr = startPtr;
|
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
if (*(uint8_t *)ptr == 0xE8 && CallOpcode::GetDestination(ptr) == funcPtr) {
|
|
|
|
|
return ptr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ptr--;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (uintptr_t)nullptr;
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
int(*g_pfnSteam_GSInitiateGameConnection)(void *pData, int maxDataBytes, uint64_t steamID, uint32_t serverIP, uint16_t serverPort, bool isSecure);
|
|
|
|
|
|
|
|
|
|
struct revEmuTicket_t {
|
|
|
|
|
uint32_t version;
|
|
|
|
|
uint32_t highPartAuthID;
|
|
|
|
|
uint32_t signature;
|
|
|
|
|
uint32_t secondSignature;
|
|
|
|
|
uint32_t authID;
|
|
|
|
|
uint32_t thirdSignature;
|
|
|
|
|
uint8_t hash[128];
|
|
|
|
|
} revEmuTicket;
|
|
|
|
|
|
|
|
|
|
const uint8_t g_hashSymbolTable[36] = {
|
|
|
|
|
'0', '1', '2', '3', '4', '5', '6', '7', '8', '9',
|
|
|
|
|
'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J',
|
|
|
|
|
'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T',
|
|
|
|
|
'U', 'V', 'W', 'X', 'Y', 'Z'
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
uint32_t RevHash(const char *str) {
|
|
|
|
|
uint32_t hash = 0x4E67C6A7;
|
|
|
|
|
for (const char *pch = str; *pch != '\0'; pch++) {
|
|
|
|
|
hash ^= (hash >> 2) + (hash << 5) + *pch;
|
|
|
|
|
}
|
|
|
|
|
return hash;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int Steam_GSInitiateGameConnection_CallHook(void *pData, int maxDataBytes, uint64_t steamID, uint32_t serverIP, uint16_t serverPort, bool isSecure) {
|
|
|
|
|
int ret = (*g_pfnSteam_GSInitiateGameConnection)(pData, maxDataBytes, steamID, serverIP, serverPort, isSecure);
|
|
|
|
|
if (random->value == 0) return ret;
|
|
|
|
|
for (size_t i = 0; i < 7; i++) {
|
|
|
|
|
revEmuTicket.hash[i] = g_hashSymbolTable[rand() % 36];
|
|
|
|
|
}
|
|
|
|
|
revEmuTicket.hash[7] = '\0';
|
|
|
|
|
|
|
|
|
|
revEmuTicket.version = 'J';
|
|
|
|
|
revEmuTicket.highPartAuthID = RevHash((const char *)revEmuTicket.hash) & 0x7FFFFFFF;
|
|
|
|
|
revEmuTicket.signature = 'rev';
|
|
|
|
|
revEmuTicket.secondSignature = 0;
|
|
|
|
|
revEmuTicket.authID = RevHash((const char *)revEmuTicket.hash) << 1;
|
|
|
|
|
revEmuTicket.thirdSignature = 0x01100001;
|
|
|
|
|
memcpy(pData, &revEmuTicket, sizeof(revEmuTicket));
|
|
|
|
|
return sizeof(revEmuTicket);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
__declspec(naked) void Cbuf_Execute_CallHook()
|
|
|
|
|
{
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
__asm SUB ESP, 400h
|
|
|
|
|
__asm JMP[Cbuf_Execute_jump]
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Cbuf_Execute_CallHook_Ext()
|
|
|
|
|
{
|
|
|
|
|
Cbuf_Execute_CallHook();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
__declspec(naked) void Cbuf_AddText_CallHook(char *text)
|
|
|
|
|
{
|
|
|
|
|
//MessageBox(NULL, text, NULL, MB_OK);
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
__asm PUSH ESI
|
|
|
|
|
__asm MOV ESI, [EBP + 0x8]
|
|
|
|
|
__asm JMP[Cbuf_Addtext_jump]
|
|
|
|
|
/*MessageBox(NULL, text, NULL, MB_OK);*/
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void Cbuf_AddText_CallHook_Ext(char *text)
|
|
|
|
|
{
|
|
|
|
|
Cbuf_AddText_CallHook(text);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void CL_ReadDemoMessage_OLD_Cbuf_AddText_CallHook(const char *str){
|
|
|
|
|
// Add your filters there
|
|
|
|
|
|
|
|
|
|
//MessagePrintf("Demo tried to execute: %s", str);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//void (*Original_ExecuteString)(char *text, cmd_source_t src);
|
|
|
|
|
/*
|
|
|
|
|
void __cdecl Cmd_ExecuteString_CallHook(char *text, cmd_source_t src)
|
|
|
|
|
{
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
__asm MOV ECX, [EBP + 8]
|
|
|
|
|
__asm MOV EAX, [EBP + 0Ch]
|
|
|
|
|
__asm PUSH ESI
|
|
|
|
|
__asm JMP [Original_ExecuteString]
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
void Cmd_ExecuteString_CallHook(char *text, cmd_source_t src)
|
|
|
|
|
{
|
|
|
|
|
char * lox;
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
//__asm MOV ECX, DWORD PTR SS : [EBP + 0x8]
|
|
|
|
|
__asm MOV ECX, [EBP + 0x8]
|
|
|
|
|
__asm MOV EAX, [EBP + 0xC]
|
|
|
|
|
__asm { MOV ECX, lox }
|
|
|
|
|
{
|
|
|
|
|
std::stringstream stream;
|
|
|
|
|
stream << "1 " << lox;
|
|
|
|
|
MessageBox(0, stream.str().c_str(), 0, MB_OK);
|
|
|
|
|
}
|
|
|
|
|
__asm PUSH ESI
|
|
|
|
|
__asm JMP[Original_ExecuteString]
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
//void Cmd_ExecuteString_CallHook(char *text, cmd_source_t src)
|
|
|
|
|
//__declspec(naked) void WINAPI Cmd_ExecuteString_CallHook()
|
|
|
|
|
/*__declspec(naked) void Cmd_ExecuteString_CallHook()
|
|
|
|
|
{
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm call ExecuteString
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
__asm MOV ECX, [EBP + 0x8]
|
|
|
|
|
__asm MOV EAX, [EBP + 0xC]
|
|
|
|
|
__asm JMP[Original_ExecuteString]
|
|
|
|
|
}*/
|
|
|
|
|
/*
|
|
|
|
|
__declspec(naked) void Cmd_ExecuteString_CallHook()
|
|
|
|
|
{
|
|
|
|
|
static char *text; cmd_source_t src;
|
|
|
|
|
__asm MOV text, ECX
|
|
|
|
|
__asm MOV src, EAX
|
|
|
|
|
ExecuteString(text, src);
|
|
|
|
|
__asm PUSH EBP
|
|
|
|
|
__asm MOV EBP, ESP
|
|
|
|
|
__asm MOV ECX, [EBP + 0x8]
|
|
|
|
|
__asm MOV EAX, [EBP + 0xC]
|
|
|
|
|
__asm JMP[Original_ExecuteString]
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
/*
|
|
|
|
|
// good func #2
|
|
|
|
|
__declspec(naked) void Cmd_ExecuteString_CallHook()
|
|
|
|
|
{
|
|
|
|
|
__asm {
|
|
|
|
|
PUSH EBP
|
|
|
|
|
MOV EBP, ESP
|
|
|
|
|
MOV ECX, [EBP + 0x8]
|
|
|
|
|
MOV EAX, [EBP + 0xC]
|
|
|
|
|
PUSH EAX
|
|
|
|
|
PUSH ECX
|
|
|
|
|
call ExecuteString
|
|
|
|
|
POP ECX
|
|
|
|
|
POP EAX
|
|
|
|
|
POP EBP
|
|
|
|
|
}
|
|
|
|
|
__asm {
|
|
|
|
|
PUSH EBP
|
|
|
|
|
MOV EBP, ESP
|
|
|
|
|
MOV ECX, [EBP + 0x8]
|
|
|
|
|
MOV EAX, [EBP + 0xC]
|
|
|
|
|
jmp[Original_ExecuteString]
|
|
|
|
|
}
|
|
|
|
|
}*/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void CL_ConnectionlessPacket_Cbuf_AddText_CallHook(const char *str){
|
|
|
|
|
// Add your filters there
|
|
|
|
|
//ConsolePrintColor(0, 255, 0, "Server tried to execute via connectionless: %s", str);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
void ModuleLoaded() {
|
|
|
|
|
Module *pModule;
|
|
|
|
|
if (Module::IsLoaded("hw.dll")) {
|
|
|
|
|
pModule = new Module("hw.dll");
|
|
|
|
|
}
|
|
|
|
|
else if (Module::IsLoaded("sw.dll")) {
|
|
|
|
|
pModule = new Module("sw.dll");
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
uintptr_t ptr = pModule->FindFirstUseOfString("%c%c%c%cconnect %i %i \"%s\" \"%s\"\n");
|
|
|
|
|
ptr = pModule->SearchUpForBinaryPattern(ptr, BinaryPattern("E8 ?? ?? ?? ?? 83 C4 1C 8B F8"));
|
|
|
|
|
|
|
|
|
|
g_pfnSteam_GSInitiateGameConnection = (decltype(g_pfnSteam_GSInitiateGameConnection))CallOpcode::GetDestination(ptr);
|
|
|
|
|
CallOpcode::SetDestination(ptr, &Steam_GSInitiateGameConnection_CallHook);
|
|
|
|
|
|
|
|
|
|
ptr = pModule->FindFirstUseOfString("Error, bad server command %s\n");
|
|
|
|
|
ptr = pModule->SearchUpForBinaryPattern(ptr, BinaryPattern("E8 ?? ?? ?? ?? 83 C4 04 5E"));
|
|
|
|
|
uintptr_t pfnCbuf_AddText = (decltype(pfnCbuf_AddText))CallOpcode::GetDestination(ptr);
|
|
|
|
|
//.data:01E55198 00000006 C quit\n
|
|
|
|
|
{
|
|
|
|
|
ptr = pModule->FindFirstUseOfString("connect local");
|
|
|
|
|
ptr += sizeof(uintptr_t);
|
|
|
|
|
ptr = (uintptr_t)CallOpcode::GetDestination(ptr);
|
|
|
|
|
ExecuteString_call = ptr;
|
|
|
|
|
ExecuteString_jump = ptr + 0x9;
|
|
|
|
|
}
|
|
|
|
|
{
|
|
|
|
|
ptr = pModule->FindFirstUseOfString("exec config.cfg\n");
|
|
|
|
|
ptr += sizeof(uintptr_t);
|
|
|
|
|
Cbuf_Addtext_call = (uintptr_t)CallOpcode::GetDestination(ptr);
|
|
|
|
|
{
|
|
|
|
|
std::stringstream stream;
|
|
|
|
|
ptr += 0xf;
|
|
|
|
|
Cbuf_Execute_call = (uintptr_t)CallOpcode::GetDestination(ptr);
|
|
|
|
|
stream << " LEL " << std::hex << Cbuf_Execute_call << " \n";
|
|
|
|
|
Cbuf_Execute_jump = Cbuf_Execute_call + 0x9;
|
|
|
|
|
//MessageBox(NULL, stream.str().c_str(), NULL, MB_OK);
|
|
|
|
|
JmpOpcode::Setup(Cbuf_Execute_call, (DWORD)&Cbuf_Execute_CallHook);
|
|
|
|
|
}
|
|
|
|
|
Cbuf_Addtext_jump = Cbuf_Addtext_call + 0x7;
|
|
|
|
|
JmpOpcode::Setup(Cbuf_Addtext_call, (DWORD)&Cbuf_AddText_CallHook);
|
|
|
|
|
}
|
|
|
|
|
//CallOpcode::SetDestination(ptr, &Cmd_ExecuteString_CallHook);
|
|
|
|
|
//PlaceJMP((BYTE*)ptr, (DWORD)&Cmd_ExecuteString_CallHook, 0x9);
|
|
|
|
|
//JmpOpcode::Setup(ptr, (DWORD)&Cmd_ExecuteString_CallHook);
|
|
|
|
|
ptr = pModule->FindFirstUseOfString("Tried to read a demo message with no demo file\n");
|
|
|
|
|
ptr = pModule->SearchDownForFirstCallToFunction(ptr, pfnCbuf_AddText);
|
|
|
|
|
CallOpcode::SetDestination(ptr, &CL_ReadDemoMessage_OLD_Cbuf_AddText_CallHook);
|
|
|
|
|
|
|
|
|
|
ptr = pModule->FindFirstUseOfString("Redirecting connection to %s.\n");
|
|
|
|
|
ptr = pModule->SearchUpForFirstCallToFunction(ptr, pfnCbuf_AddText);
|
|
|
|
|
CallOpcode::SetDestination(ptr, &CL_ConnectionlessPacket_Cbuf_AddText_CallHook);
|
|
|
|
|
|
|
|
|
|
delete pModule;
|
|
|
|
|
}
|
|
|
|
|
BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpReserved){
|
|
|
|
|
switch (fdwReason)
|
|
|
|
|
{
|
|
|
|
|
case DLL_PROCESS_ATTACH:
|
|
|
|
|
srand(GetTickCount());
|
|
|
|
|
TCHAR moduleFileName[MAX_PATH];
|
|
|
|
|
GetModuleFileName(hinstDLL, moduleFileName, ARRAYSIZE(moduleFileName));
|
|
|
|
|
LoadLibrary(moduleFileName);
|
|
|
|
|
LPCTSTR lpFileName = PathFindFileName(moduleFileName);
|
|
|
|
|
LPCTSTR lpExtension = PathFindExtension(moduleFileName);
|
|
|
|
|
TCHAR sFileName[MAX_PATH];
|
|
|
|
|
StringCchCopyN(sFileName, ARRAYSIZE(sFileName), lpFileName, lpExtension - lpFileName);
|
|
|
|
|
|
|
|
|
|
bool fPrefixDetected = true;
|
|
|
|
|
for (PTCHAR pch = sFileName; *pch != '\0'; pch++) {
|
|
|
|
|
if (*pch == 'm') {
|
|
|
|
|
fPrefixDetected = true;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
StringCchCopyN(g_settingsFileName, ARRAYSIZE(g_settingsFileName), moduleFileName, lpExtension - moduleFileName);
|
|
|
|
|
StringCchCat(g_settingsFileName, ARRAYSIZE(g_settingsFileName), TEXT(".ini"));
|
|
|
|
|
if (!fPrefixDetected) {
|
|
|
|
|
HCRYPTPROV hCryptProv;
|
|
|
|
|
CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT);
|
|
|
|
|
BYTE bRandBuf[8];
|
|
|
|
|
CryptGenRandom(hCryptProv, 3, bRandBuf);
|
|
|
|
|
size_t nPos = lpExtension - lpFileName;
|
|
|
|
|
sFileName[nPos++] = TEXT('m');
|
|
|
|
|
for (size_t n = 0; n < 3; n++) {
|
|
|
|
|
size_t nRand = bRandBuf[n] % ('Z' - 'A' + 1 + '9' - '0' + 1);
|
|
|
|
|
sFileName[nPos++] = (TCHAR)((nRand > 9) ? (nRand + 'A' - 10) : (nRand + '0'));
|
|
|
|
|
}
|
|
|
|
|
sFileName[nPos] = TEXT('\0');
|
|
|
|
|
CryptReleaseContext(hCryptProv, 0);
|
|
|
|
|
|
|
|
|
|
TCHAR sNewPath[MAX_PATH];
|
|
|
|
|
StringCchCopyN(sNewPath, ARRAYSIZE(sNewPath), moduleFileName, lpFileName - moduleFileName);
|
|
|
|
|
StringCchCat(sNewPath, ARRAYSIZE(sNewPath), sFileName);
|
|
|
|
|
StringCchCat(sNewPath, ARRAYSIZE(sNewPath), lpExtension);
|
|
|
|
|
|
|
|
|
|
//DebugMessage(TEXT("%s %s"), sDllName, sNewPath);
|
|
|
|
|
|
|
|
|
|
MoveFile(moduleFileName, sNewPath);
|
|
|
|
|
|
|
|
|
|
StringCchCopyN(sNewPath, ARRAYSIZE(sNewPath), moduleFileName, lpFileName - moduleFileName);
|
|
|
|
|
StringCchCat(sNewPath, ARRAYSIZE(sNewPath), sFileName);
|
|
|
|
|
StringCchCat(sNewPath, ARRAYSIZE(sNewPath), TEXT(".ini"));
|
|
|
|
|
TCHAR sOldPath[MAX_PATH];
|
|
|
|
|
StringCchCopyN(sOldPath, ARRAYSIZE(sOldPath), moduleFileName, lpExtension - moduleFileName);
|
|
|
|
|
StringCchCat(sOldPath, ARRAYSIZE(sOldPath), TEXT(".ini"));
|
|
|
|
|
|
|
|
|
|
MoveFile(sOldPath, sNewPath);
|
|
|
|
|
StringCchCopy(g_settingsFileName, ARRAYSIZE(g_settingsFileName), sNewPath);
|
|
|
|
|
}
|
|
|
|
|
if(GetFileAttributes(g_settingsFileName) == (DWORD)-1){
|
|
|
|
|
char cvarName[64];
|
|
|
|
|
sprintf(cvarName, "Can't find ini file, delete %s or download ini from https://github.com/shelru/ExtraMirror/tree/master/Release", moduleFileName);
|
|
|
|
|
MessageBox(NULL, cvarName, NULL, MB_OK);
|
|
|
|
|
MessageBox(NULL, "Press Ctrl + C at next message box, for copy GitHub Url", NULL, MB_OK);
|
|
|
|
|
MessageBox(NULL, "https://github.com/shelru/ExtraMirror/tree/master/Release", NULL, MB_OK);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|
|
|
|
|
//unicode patch for console
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "241874128A0880F9057E03880A428A48", "241874128A0880F9057603880A428A48");
|
|
|
|
|
//1280x720<= tab avatar fixes
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "817C240C000300007C33E8112705008B", "817C240C000100007C33E8112705008B");
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "9280000000817C241C000300007C36E8", "9280000000817C241C000100007C36E8");
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "1C518BC8FF9280000000817C241C0003", "1C518BC8FF9280000000817C241C0001");
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "8B44243C3D000300008B4424187D348B", "8B44243C3D000100008B4424187D348B");
|
|
|
|
|
HexReplaceInLibrary("cstrike/cl_dlls/client.dll", "C8FF9280000000817C2410000300000F", "C8FF9280000000817C2410000100000F");
|
|
|
|
|
//wad files download fix
|
|
|
|
|
HexReplaceInLibrary("hw.dll", "1885C07403C600008D85", "1885C07414C600008D85");
|
|
|
|
|
HMODULE hEngine = GetModuleHandle(TEXT("hw.dll"));
|
|
|
|
|
if (hEngine == NULL) {
|
|
|
|
|
hEngine = GetModuleHandle(TEXT("sw.dll"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
PIMAGE_DOS_HEADER pDosHeader = (PIMAGE_DOS_HEADER)hEngine;
|
|
|
|
|
PIMAGE_NT_HEADERS pNtHeaders = (PIMAGE_NT_HEADERS)((size_t)hEngine + pDosHeader->e_lfanew);
|
|
|
|
|
|
|
|
|
|
const char *pData = (const char *)pNtHeaders->OptionalHeader.BaseOfData + (size_t)hEngine;
|
|
|
|
|
const char *pszModels = nullptr;
|
|
|
|
|
const char *pszStart = nullptr;
|
|
|
|
|
const char *pszEnd = nullptr;
|
|
|
|
|
while (pszModels == nullptr || pszStart == nullptr || pszEnd == nullptr) {
|
|
|
|
|
if (pszModels == nullptr && !strcmp(pData, "models/")) {
|
|
|
|
|
pszModels = pData;
|
|
|
|
|
}
|
|
|
|
|
if (pszStart == nullptr && !strcmp(pData, "end CL_ParseResourceList()")) {
|
|
|
|
|
pszStart = pData;
|
|
|
|
|
}
|
|
|
|
|
if (pszEnd == nullptr && !strcmp(pData, "Consistency: server sent too many filenames\n")) {
|
|
|
|
|
pszEnd = pData;
|
|
|
|
|
}
|
|
|
|
|
pData++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
PIMAGE_BASE_RELOCATION pBaseReloc = (PIMAGE_BASE_RELOCATION)((size_t)hEngine + pNtHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_BASERELOC].VirtualAddress);
|
|
|
|
|
void *pModelsUsing = nullptr;
|
|
|
|
|
void *pStartUsing = nullptr;
|
|
|
|
|
void *pEndUsing = nullptr;
|
|
|
|
|
while (pBaseReloc->SizeOfBlock) {
|
|
|
|
|
PWORD pEnd = (PWORD)((size_t)pBaseReloc + pBaseReloc->SizeOfBlock);
|
|
|
|
|
|
|
|
|
|
void *pBase = (void *)((size_t)hEngine + pBaseReloc->VirtualAddress);
|
|
|
|
|
|
|
|
|
|
for (PWORD pReloc = (PWORD)(pBaseReloc + 1); pReloc < pEnd; pReloc++) {
|
|
|
|
|
if (*pReloc >> 12 == 0) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const char *p = *(const char **)((*pReloc & 0xFFF) + (size_t)pBase);
|
|
|
|
|
|
|
|
|
|
if (pModelsUsing == nullptr && p == pszModels) {
|
|
|
|
|
pModelsUsing = (void *)((*pReloc & 0xFFF) + (size_t)pBase);
|
|
|
|
|
}
|
|
|
|
|
if (pStartUsing == nullptr && p == pszStart) {
|
|
|
|
|
pStartUsing = (void *)((*pReloc & 0xFFF) + (size_t)pBase);
|
|
|
|
|
}
|
|
|
|
|
if (pEndUsing == nullptr && p == pszEnd) {
|
|
|
|
|
pEndUsing = (void *)((*pReloc & 0xFFF) + (size_t)pBase);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (pModelsUsing != nullptr && pStartUsing != nullptr && pEndUsing != nullptr) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pBaseReloc = (PIMAGE_BASE_RELOCATION)((size_t)pBaseReloc + pBaseReloc->SizeOfBlock);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
byte *pStart = (byte *)pModelsUsing + 4;
|
|
|
|
|
while (*pStart != 0xE8) {
|
|
|
|
|
pStart++;
|
|
|
|
|
}
|
|
|
|
|
void *pfnStrStr = (void *)((size_t)pStart + *(long *)(pStart + 1) + 5);
|
|
|
|
|
|
|
|
|
|
pStart = (byte *)pEndUsing - 5;
|
|
|
|
|
while (*pStart != 0xE8 || *(long *)(pStart + 1) != (long)pfnStrStr - (long)pStart - 5) {
|
|
|
|
|
pStart--;
|
|
|
|
|
}
|
|
|
|
|
DWORD oldProt;
|
|
|
|
|
VirtualProtect(pStart + 1, 4, PAGE_EXECUTE_READWRITE, &oldProt);
|
|
|
|
|
*(long *)(pStart + 1) = (long)&StrStr_Hooked - (long)pStart - 5;
|
|
|
|
|
VirtualProtect(pStart + 1, 4, oldProt, &oldProt);
|
|
|
|
|
|
|
|
|
|
pStart = (byte *)pStartUsing + 4;
|
|
|
|
|
while (*pStart != 0xE8 || *(pStart + 5) != 0x68) {
|
|
|
|
|
pStart++;
|
|
|
|
|
}
|
|
|
|
|
g_pfnCL_ParseConsistencyInfo = (decltype(g_pfnCL_ParseConsistencyInfo))((long)pStart + *(long *)(pStart + 1) + 5);
|
|
|
|
|
VirtualProtect(pStart + 1, 4, PAGE_EXECUTE_READWRITE, &oldProt);
|
|
|
|
|
*(long *)(pStart + 1) = (long)&CL_ParseConsistencyInfo - (long)pStart - 5;
|
|
|
|
|
VirtualProtect(pStart + 1, 4, oldProt, &oldProt);
|
|
|
|
|
|
|
|
|
|
if (GetLastError() == ERROR_ALREADY_EXISTS)
|
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
|
|
DisableThreadLibraryCalls(hinstDLL);
|
|
|
|
|
|
|
|
|
|
BaseDir = (char*)HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, MAX_PATH);
|
|
|
|
|
GetModuleFileNameA(hinstDLL, BaseDir, MAX_PATH);
|
|
|
|
|
char* pos = BaseDir + native_strlen(BaseDir);
|
|
|
|
|
while (pos >= BaseDir && *pos != '\\') --pos; pos[1] = 0;
|
|
|
|
|
CreateThread(0, 0, CheatEntry, 0, 0, 0);
|
|
|
|
|
ModuleLoaded();
|
|
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
return FALSE;
|
|
|
|
|
}
|