59 lines
1.7 KiB
C++
Raw Normal View History

#include "match.h"
#include "engine.h"
2018-08-23 11:53:23 -04:00
#include "main.h"
#include "native/pchooks.h"
2019-02-27 11:33:17 -05:00
extern const char* HIJACK_ERROR;
uintptr_t processStartAddress, processStopAddress;
namespace Engine
{
WCHAR* processName, // cached
processPath[MAX_PATH]; // cached
bool UnsafeDetermineEngineType();
// jichi 10/21/2014: Return whether found the game engine
bool DetermineEngineType()
{
// jichi 9/27/2013: disable game engine for debugging use
bool found = false;
2018-09-03 18:43:43 -04:00
#ifndef ITH_DISABLE_ENGINE
__try { found = UnsafeDetermineEngineType(); }
__except (EXCEPTION_EXECUTE_HANDLER) { ConsoleOutput(HIJACK_ERROR); }
2018-09-03 18:43:43 -04:00
#endif // ITH_DISABLE_ENGINE
if (!found) { // jichi 10/2/2013: Only enable it if no game engine is detected
PcHooks::hookOtherPcFunctions();
} //else
// ConsoleOutput("vnreng: found game engine, IGNORE non gui hooks");
return found;
}
DWORD InsertDynamicHook(LPVOID addr, DWORD frame, DWORD stack)
2018-08-25 15:45:25 -04:00
{
return trigger_fun ? !trigger_fun(addr, frame, stack) : 0;
}
2018-08-25 15:45:25 -04:00
void Hijack()
{
static bool hijacked = false;
if (hijacked) return;
GetModuleFileNameW(nullptr, processPath, MAX_PATH);
processName = wcsrchr(processPath, L'\\') + 1;
processStartAddress = processStopAddress = (uintptr_t)GetModuleHandleW(nullptr);
MEMORY_BASIC_INFORMATION info;
do
{
VirtualQuery((void*)processStopAddress, &info, sizeof(info));
processStopAddress = (uintptr_t)info.BaseAddress + info.RegionSize;
} while (info.Protect > PAGE_NOACCESS);
processStopAddress -= info.RegionSize;
DetermineEngineType();
hijacked = true;
ConsoleOutput("Textractor: finished hijacking %S located from 0x%p to 0x%p", processName, processStartAddress, processStopAddress);
}
}