Finally have something that runs and crashes.

This thing is pointing at a wrong memory location due to the fact that
there's another function that STARTS THE SAME.

I'll use another method to do this.
This commit is contained in:
Jazzinghen 2020-05-23 15:53:11 +09:00 committed by Akash Mozumdar
parent 261da66d74
commit 51b217169e
2 changed files with 101 additions and 1 deletions

View File

@ -27,6 +27,7 @@
//#include <boost/foreach.hpp>
#include <cstdio>
#include <string>
#include <sstream>
// jichi 375/2014: Add offset of pusha/pushad
// http://faydoc.tripod.com/cpu/pushad.htm
@ -6615,6 +6616,106 @@ bool InsertNitroplusHook()
return true;
}
/**
* Jazzinghen 23/05/2020: Add TokyoNecro hook
*
* [Nitroplus] Necro 1.01
*
* Hook code: HS-14*8@B5420:TokyoNecro.exe
*
* -
*
* Disassembled code:
*
* TokyoNecro.exe+B5420 - 55 - push ebp ; place to hook
* TokyoNecro.exe+B5421 - 8B EC - mov ebp,esp
* TokyoNecro.exe+B5423 - 6A FF - push -01
* TokyoNecro.exe+B5425 - 68 E8613000 - push TokyoNecro.exe+1961E8
* TokyoNecro.exe+B542A - 64 A1 00000000 - mov eax,fs:[00000000]
* TokyoNecro.exe+B5430 - 50 - push eax
* TokyoNecro.exe+B5431 - 64 89 25 00000000 - mov fs:[00000000],esp
* TokyoNecro.exe+B5438 - 83 EC 1C - sub esp,1C
* TokyoNecro.exe+B543B - 8B 55 08 - mov edx,[ebp+08]
* TokyoNecro.exe+B543E - 53 - push ebx
* TokyoNecro.exe+B543F - 56 - push esi
* TokyoNecro.exe+B5440 - 8B C2 - mov eax,edx
* TokyoNecro.exe+B5442 - 57 - push edi
* TokyoNecro.exe+B5443 - 8B D9 - mov ebx,ecx
* TokyoNecro.exe+B5445 - C7 45 EC 0F000000 - mov [ebp-14],0000000F
* TokyoNecro.exe+B544C - C7 45 E8 00000000 - mov [ebp-18],00000000
*
* Notes:
*
* The text is contained into the memory location at [ebp+08].
*
* There's a second hook that seems to be capturing the game encyclopedia plus
* extra garbage (only when it is brought to screen): /HS4@B5380:tokyonecro.exe
* https://wiki.anime-sharing.com/hgames/index.php?title=AGTH/H-Codes#More_H-Codes.5B74.5D
*
* I can confirm that that function is called consistently at every call of the
* encyclopedia but I don't know what memory location is a positive number in the hook
* code.
*/
bool InsertTokyoNecroHook() {
const BYTE bytecodes[] = {
0x55, // 55 - push ebp
0x8b, 0xec, // 8B EC - mov ebp,esp
0x6a, 0xff, // 6A FF - push -01
0x68, XX4, // 68 E8613000 - push TokyoNecro.exe+1961E8
0x64, 0xa1, XX4, // 64 A1 00000000 - mov eax,fs:[00000000]
0x50, // 50 - push eax
0x64, 0x89, 0x25, XX4, // 64 89 25 00000000 - mov fs:[00000000],esp
0x83, 0xec, 0x1c, // 83 EC 1C - sub esp,1C
0x8b, 0x55, 0x08, // 8B 55 08 - mov edx,[ebp+08]
0x53, // 53 - push ebx
0x56, // 56 - push esi
0x8B, 0xc2, // 8B C2 - mov eax,edx
0x57, // 57 - push edi
0x8b, 0xd9, // 8B D9 - mov ebx,ecx
0xc7, 0x45, 0xec, XX4, // C7 45 EC 0F000000 - mov [ebp-14],0000000F
0xc7, 0x45, 0xe8, XX4 // C7 45 E8 00000000 - mov [ebp-18],00000000
};
ULONG range = min(processStopAddress - processStartAddress, MAX_REL_ADDR);
ULONG addr =
MemDbg::findBytes(bytecodes, sizeof(bytecodes), processStartAddress,
processStartAddress + range);
enum {
addr_offset = 0
}; // distance to the beginning of the function
if (addr == 0ull) {
ConsoleOutput("vnreng:TokyoNecro: pattern not found");
return false;
}
addr += addr_offset;
std::stringstream stream;
stream << std::hex << addr;
std::string debugOut = "vnreng: TokyoNecro. Hook address: " +
stream.str();
ConsoleOutput(debugOut.c_str());
enum { push_ebp = 0x55 }; // OPCode for function begin
if (*(BYTE *)addr != push_ebp) {
// This should never happen
ConsoleOutput("vnreng:TokyoNecro: beginning of the function not found");
return false;
}
HookParam hp = {};
hp.address = addr;
hp.offset = -0x14;
hp.index = 8;
hp.type = USING_STRING;
ConsoleOutput("vnreng: INSERT TokyoNecro");
NewHook(hp, "TokyoNecro");
return true;
}
// jichi 6/21/2015
namespace { // unnamed

View File

@ -443,7 +443,6 @@ bool DetermineEngineByFile4()
// - TokyoNecro.exe in "OriginalFilename"
if (Util::CheckFile(L"*.npk")) {
if (Util::SearchResourceString(L"TOKYONECRO")) {
ConsoleOutput("vnreng: Hooking TokyoNecro");
InsertTokyoNecroHook();
}
else {