116 lines
3.1 KiB
C++
Raw Normal View History

2024-06-02 13:53:06 +08:00
#include "CodeX.h"
2024-02-07 20:59:24 +08:00
bool CodeXFilter(LPVOID data, size_t *size, HookParam *)
{
2024-06-02 13:53:06 +08:00
std::string result = std::string((char *)data, *size);
strReplace(result, "^n", "\n");
if (startWith(result, "\n"))
result = result.substr(1);
2024-02-07 20:59:24 +08:00
//|晒[さら]
result = std::regex_replace(result, std::regex("\\|(.+?)\\[(.+?)\\]"), "$1");
2024-06-02 13:53:06 +08:00
return write_string_overwrite(data, size, result);
2024-02-07 20:59:24 +08:00
}
2024-06-02 13:53:06 +08:00
bool InsertCodeXHook()
2024-02-07 20:59:24 +08:00
{
2024-06-02 13:53:06 +08:00
/*
* Sample games:
* https://vndb.org/v41664
* https://vndb.org/v36122
*/
2024-02-07 20:59:24 +08:00
const BYTE bytes[] = {
2024-06-02 13:53:06 +08:00
0x83, 0xC4, 0x08, // add esp,08 << hook here
0x8D, 0x85, XX4, // lea eax,[ebp-00000218]
0x50, // push eax
0x68, XX4, // push ???????????!.exe+10A76C
0x85, 0xF6, // test esi,esi
0x74, 0x4F, // je ???????????!.exe+2A95B
0xFF, 0x15, XX4, // call dword ptr [???????????!.exe+C8140]
0x8B, 0x85, XX4 // mov eax,[ebp-00000220] << alternative hook here
2024-02-07 20:59:24 +08:00
};
ULONG range = min(processStopAddress - processStartAddress, MAX_REL_ADDR);
ULONG addr = MemDbg::findBytes(bytes, sizeof(bytes), processStartAddress, processStartAddress + range);
2024-06-02 13:53:06 +08:00
if (!addr)
{
2024-02-07 20:59:24 +08:00
ConsoleOutput("CodeX: pattern not found");
return false;
}
HookParam hp;
hp.address = addr;
2024-06-02 13:53:06 +08:00
hp.offset = get_reg(regs::eax);
2024-02-07 20:59:24 +08:00
hp.index = 0;
2024-08-18 17:22:15 +08:00
hp.type = USING_STRING | EMBED_ABLE | EMBED_AFTER_OVERWRITE | EMBED_BEFORE_SIMPLE; // 无法解决中文乱码
hp.hook_font = F_GetGlyphOutlineA;
2024-02-07 20:59:24 +08:00
hp.filter_fun = CodeXFilter;
ConsoleOutput("INSERT CodeX");
2024-06-02 13:53:06 +08:00
2024-02-07 20:59:24 +08:00
return NewHook(hp, "CodeX");
}
2024-06-02 13:53:06 +08:00
namespace
{
bool hook()
{
// 霞外籠逗留記
BYTE _[] = {0x90, 0x90, 0x68, 0x64, 0x7B, 0x4C, 0x00}; // aHdL db 'hd{L',0
2024-02-07 20:59:24 +08:00
ULONG addr = MemDbg::findBytes(_, sizeof(_), processStartAddress, processStopAddress);
2024-06-02 13:53:06 +08:00
if (addr == 0)
return false;
addr += 2;
BYTE bytes[] = {0x68, XX4};
memcpy(bytes + 1, &addr, 4);
2024-02-07 20:59:24 +08:00
auto addrs = Util::SearchMemory(bytes, sizeof(bytes), PAGE_EXECUTE, processStartAddress, processStopAddress);
2024-06-02 13:53:06 +08:00
bool succ = false;
for (auto adr : addrs)
{
adr = MemDbg::findEnclosingAlignedFunction(adr);
if (adr == 0)
continue;
2024-02-07 20:59:24 +08:00
HookParam hp;
hp.address = adr;
2024-06-02 13:53:06 +08:00
hp.offset = get_stack(1);
2024-02-07 20:59:24 +08:00
hp.type = CODEC_ANSI_BE;
2024-06-02 13:53:06 +08:00
succ |= NewHook(hp, "CodeX");
2024-02-07 20:59:24 +08:00
}
2024-06-02 13:53:06 +08:00
return succ;
2024-02-07 20:59:24 +08:00
}
}
2024-06-02 13:53:06 +08:00
namespace
{
// https://vndb.org/v598
// ANGEL BULLET
bool hook2()
{
BYTE _[] = {
0x8b, 0x44, 0x24, 0x04,
0x81, 0xec, XX4,
0x25, 0xff, 0xff, 0, 0,
0x8d, 0x54, 0x24, 0,
0x56,
0x8b, 0xf1,
0x50,
0x8d, 0x4e, XX,
0x51,
0x68, XX4, //%s%03d
0x52,
0xff, 0x15, XX4, // wprintfA
};
ULONG addr = MemDbg::findBytes(_, sizeof(_), processStartAddress, processStopAddress);
if (addr == 0)
return false;
HookParam hp;
hp.address = addr;
hp.offset = get_reg(regs::edx);
hp.type = USING_STRING;
hp.filter_fun = CodeXFilter;
return NewHook(hp, "CodeX");
}
}
bool CodeX::attach_function()
{
return InsertCodeXHook() || hook() || hook2();
}