Compare commits
171 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 55324bb5a8 | |||
| 211f40ae53 | |||
| deddf93d3f | |||
| c37d0e92f4 | |||
| fa3a3aa9cc | |||
| 186471508f | |||
| 1f0a6bc016 | |||
| da08b565f8 | |||
| ead6489e63 | |||
| 19d6139e13 | |||
| 0047d7b64f | |||
| 264cdc2528 | |||
| ab4615dfe9 | |||
| cf34ac6e01 | |||
| 6c7bbabced | |||
| 81ddaeeda7 | |||
| b9cae22212 | |||
| 8201e29e26 | |||
| 71144b4cd1 | |||
| 5af8d2463a | |||
| ea1d2f91f2 | |||
| f0ed718cf3 | |||
| bc09349b8e | |||
| 66e51c6d9a | |||
| bc7b24f4d9 | |||
| 9b55d4f160 | |||
| 57b2423a8a | |||
| e96bf23a30 | |||
| 9296e00edd | |||
| d22ded3d27 | |||
| 15c403b0d1 | |||
| 1cc16ecbd9 | |||
| ffe75e9de7 | |||
| 243e39d04b | |||
| daa5585527 | |||
| 8bf5aac0ec | |||
| 4c7dd302d5 | |||
| 63eed9d796 | |||
| 671f9ba246 | |||
| 868b4e27be | |||
| 56eefd83d7 | |||
| 3b2d33ad24 | |||
| ba6a054ec3 | |||
| 7693e63619 | |||
| 5d5d2117ec | |||
| ca65bbd70c | |||
| c17cf00409 | |||
| c80635fc71 | |||
| e9d2130105 | |||
| 0bfab4f682 | |||
| e0fcca3701 | |||
| 3b7cda6c5f | |||
| e066466339 | |||
| 612c2e74e6 | |||
| 4060fb5d4e | |||
| 54978e367c | |||
| e0d89875a0 | |||
| 89c6347315 | |||
| de15c00f2a | |||
| 694c734e67 | |||
| 0641006998 | |||
| 79cf7d20cc | |||
| 505d4b12dd | |||
| bb8d41c06d | |||
| b8aa6f968b | |||
| 9a3d623883 | |||
| 6b9f9b6d93 | |||
| 400729a3dc | |||
| 7eac309372 | |||
| 592ce62e6b | |||
| 4911f8d903 | |||
| 970561afb9 | |||
| dcb482ab8e | |||
| 5e2b015cc0 | |||
| 7beab899a6 | |||
| ac67488255 | |||
| 1375549216 | |||
| 19056bed0d | |||
| 8dfe04d005 | |||
| 6bdb04a925 | |||
| 9ccde2618b | |||
| ce58ec89ef | |||
| 5b1ac8533d | |||
| e554c8e57b | |||
| be445e6db9 | |||
| 6279bb573d | |||
| eb38894de5 | |||
| 2612ad2212 | |||
| b3f64ba6f6 | |||
| dd15dc60e3 | |||
| ac68448cbd | |||
| 80c817cb6b | |||
| 4e614e1d82 | |||
| 8b9f8e68aa | |||
| 99c0c20a3d | |||
| 64a25b1607 | |||
| 43e8adaf12 | |||
| 0004c26d7a | |||
| 848ae06792 | |||
| c979c980c1 | |||
| 3d943b641b | |||
| 215af6e3db | |||
| 7aef85851c | |||
| f7c24f5ab7 | |||
| 2ebd40b621 | |||
| 7f43a042e8 | |||
| 8164694c8f | |||
| 61e657b2e4 | |||
| 7a8087e8a1 | |||
| 351fe85e2f | |||
| 938b663bd9 | |||
| df1f611199 | |||
| 94efee7496 | |||
| 06be53ad8e | |||
| ce427556a3 | |||
| 15f56c9e5a | |||
| b860834be1 | |||
| 8c900f93fc | |||
| a7d68776bd | |||
| 6d742b2a15 | |||
| cf5d87f7a7 | |||
| 181d14e4ce | |||
| 0067ceb85c | |||
| 33cf0a65e8 | |||
| d30a2aba9e | |||
| 05ed4980c5 | |||
| 1341e1600c | |||
| 0e2b60aecb | |||
| 33f7dd89a9 | |||
| 851ebb5b9a | |||
| a0e79dcea0 | |||
| 55fd21feef | |||
| 22a7fb2a60 | |||
| 39147ac049 | |||
| 9a1405c828 | |||
| 5473908df4 | |||
| 6a237fd247 | |||
| 95dec1b0fd | |||
| 661ef826c3 | |||
| 6209157cf2 | |||
| f26bcbd0fc | |||
| 14c90f7137 | |||
| 8f96ec4eec | |||
| 5421487212 | |||
| 326ccd188e | |||
| 0b0216e41e | |||
| 4c0c35ba43 | |||
| e299d264de | |||
| cba9b20171 | |||
| 5640987ead | |||
| 54a127b848 | |||
| 3994188b08 | |||
| 7ffce8fe3a | |||
| 5143dc0d56 | |||
| 0afdf60cc6 | |||
| ed983d2b25 | |||
| f8954d0857 | |||
| 8662c84a0a | |||
| 38dbf82f7f | |||
| 2584898be6 | |||
| 006ff30914 | |||
| 88568b374d | |||
| 30b79c1cb3 | |||
| e29b27bfd1 | |||
| bcbc679a21 | |||
| 435f1b0355 | |||
| f965bb79a3 | |||
| a79ebdc0c8 | |||
| 0dea9e7625 | |||
| c1cfed6216 | |||
| ab0668d3a9 |
3
.gitignore
vendored
3
.gitignore
vendored
@ -3,8 +3,9 @@
|
||||
.directory
|
||||
|
||||
# File withheld to make abuse more difficult
|
||||
game_payload/src/tp6.c
|
||||
game_payload/src/core.c
|
||||
|
||||
build
|
||||
out
|
||||
jadeite.zip
|
||||
v*.zip
|
||||
|
||||
44
README.md
44
README.md
@ -1,35 +1,47 @@
|
||||
# PROOF OF CONCEPT. DO NOT USE IF YOU DON'T KNOW WHAT YOU'RE DOING
|
||||
|
||||
### Games and regions
|
||||
This project is in the proof-of-concept stage. Currently, only **3rd glb v6.6.0** is supported. It may be possilbe to completely remove the region and version-specific data in the future. Refer to the source code in `game_payload/src` for details.
|
||||
- **3rd**: glb/sea/tw/kr/jp **v7.1.0+**, cn **v7.2.0+**
|
||||
- **SR**: os/cn **v1.6.0** (potentially unsafe, but no bans were reported since v1.1.0)
|
||||
|
||||
You can expect newer versions to work immediately after release with the same jadeite binary if the version is specified with a + above.
|
||||
|
||||
### Information
|
||||
The anticheat the games use is fundamentally incompatible with Wine in multiple ways. This tool launches the game without it (`inject/launcher_payload`) and imitates it's behaviour (`game_payload`).
|
||||
The anticheat the games use is fundamentally incompatible with Wine in multiple ways. This tool launches the game without it (`injector`) and imitates it's behaviour (`game_payload`).
|
||||
|
||||
Does not work on Windows.
|
||||
**Using third-party software (such as this tool) with the games violates their Terms of Service**. Therefore, **you may receive a ban**. No bans were ever reported with 3rd, however the legacy patch for SR did cause many. **Use at your own risk and only if you understand all the possible consequences**.
|
||||
|
||||
**This is not a cheating tool**. Using it with Windows is not possible, and Windows support is not planned or intended in any way. However, as it does not perform any on-disk file modifications, you may reuse the same game install for Windows if you have a dual-boot setup.
|
||||
|
||||
### Usage
|
||||
**Refer to [Third-party launchers](#third-party-launchers) (will be written later)** for convenient usage. If you don't want to (or can't) use third-party launchers, continue reading the section below.
|
||||
**Refer to [third-party launchers](#third-party-launchers)** for convenient usage. If you don't want to (or can't) use third-party launchers, continue reading the section below.
|
||||
|
||||
**Wine 8.0+ is recommended**, as lower versions leak "The Wine project" as the device identifier. Not critical, but taking a precaution never hurt anyone. **DXVK is strongly recommended.**
|
||||
|
||||
3rd-specific: In some cases, and if you're not using Proton GE, **a fix for Media Foundation may be required to play videos. The Game may crash without it.** You can download it from [here](https://github.com/z0z0z/mf-install). You might need to [limit the number of cores available to the game](https://github.com/z0z0z/mf-install/issues/44) if your CPU has more than 8.
|
||||
**3rd-specific**:
|
||||
- **Wine 8.21+ or [Wine-GE-Proton](https://github.com/GloriousEggroll/wine-ge-custom) is required to play videos. The game may show a black screen or crash on lower versions.**
|
||||
- You might need to [limit the number of cores available to the game](https://github.com/z0z0z/mf-install/issues/44) if your CPU has more than 8.
|
||||
|
||||
Manual usage instructions:
|
||||
- Download the game you want to run
|
||||
- Download a release from this repository
|
||||
- Download the latest release from this repository
|
||||
- Extract the archive (**NOT INTO THE GAME DIRECTORY! THIS IS IMPORTANT!**)
|
||||
- Block analytics servers in your `hosts` file. You can find the list in SERVERS.txt
|
||||
- Run `wine jadeite.exe "Z:\\wine\\path\\to\\game.exe"`
|
||||
- Run `./block_analytics.sh` from the archive to block the games from accessing analytics servers (you might have to do a `chmod +x block_analytics.sh` first). This will require superuser privileges
|
||||
- Run `wine jadeite.exe 'Z:\wine\path\to\game.exe'`
|
||||
|
||||
This tool is capable of starting the games from a different process. This may be useful for spoofing the parent process (SR is known to report it). Use `wine jadeite.exe "Z:\\wine\\path\\to\\game.exe" "Z:\\wine\\path\\to\\launcher.exe"`. `explorer.exe` is used as the default.
|
||||
This tool is capable of starting the games from a different process. This may be useful for spoofing the parent process (SR is known to report it). Use `wine jadeite.exe 'Z:\wine\path\to\game.exe' 'Z:\wine\path\to\launcher.exe'`. `explorer.exe` is used as the default.
|
||||
|
||||
To pass commandline arguments to the game, append them after the launcher path: `wine jadeite.exe 'Z:\wine\path\to\game.exe' 'Z:\wine\path\to\launcher.exe' -arg1 -arg2 -arg3`. To use the default launcher process, use `--`: `wine jadeite.exe 'Z:\wine\path\to\game.exe' -- -arg1 -arg2 -arg3`.
|
||||
|
||||
### Configuration
|
||||
These environment variables can be used to configure the behaviour of the tool. Any value except empty string counts as set. `1` will be used in all examples.
|
||||
|
||||
- `WAIT_BEFORE_RESUME=1` - show a messagebox and wait for user input before resuming the game process. Useful on my side for debugging
|
||||
|
||||
### Internals
|
||||
This tool consists of three parts: the main injector (`injector`), the launcher payload (`injector/launcher_payload`) and the game payload (`game_payload`).
|
||||
This tool consists of three parts: the main injector (`injector/src/exe.c`), the launcher payload (`injector/src/dll.c`) and the game payload (`game_payload`).
|
||||
|
||||
I am very bad at explaining, so just take a look at the source code. Maybe I'll write a detailed explanation in the future.
|
||||
|
||||
A part of the source code is witheld (`game_payload/src/tp6.c`). This is a forced measure to make abuse more difficult.
|
||||
A part of the source code is witheld (`game_payload/src/core.c`). This is a forced measure to make abuse more difficult. However, a precompiled blob is provided in the repo. `build.sh` will use it automatically.
|
||||
|
||||
### Guildelines
|
||||
1. **Please don't share this project in public.** This might attract unnecessary attention from either the Game Company or the Anticheat Company
|
||||
@ -39,11 +51,13 @@ A part of the source code is witheld (`game_payload/src/tp6.c`). This is a force
|
||||
Please do not report any issues with the Game to the official channels. Use the issue tracker of this repository
|
||||
|
||||
### Third-party launchers
|
||||
Will be written later
|
||||
- Honkers Launcher — Linux launcher for 3rd ([GitHub](https://github.com/an-anime-team/honkers-launcher) | [Codeberg](https://codeberg.org/an-anime-team/honkers-launcher))
|
||||
- The Honkers Railway Launcher — Linux launcher for SR ([GitHub](https://github.com/an-anime-team/the-honkers-railway-launcher) | [Codeberg](https://codeberg.org/an-anime-team/the-honkers-railway-launcher))
|
||||
|
||||
### Credits
|
||||
- mkrsym1 — project leader, reverse engineering
|
||||
- Yor#1920 — major help with analyzing network activity
|
||||
- [EternalStudentDesuKa](https://github.com/EternalStudentDesuKa) — major help with analyzing network activity
|
||||
- [An Anime Team](https://github.com/an-anime-team) — Honkers Launcher and The Honkers Railway Launcher
|
||||
- Some others credited in the source code
|
||||
|
||||
License: MIT
|
||||
|
||||
@ -1,4 +0,0 @@
|
||||
# Honkai Impact 3rd logging servers:
|
||||
0.0.0.0 log-upload-os.hoyoverse.com
|
||||
0.0.0.0 sg-public-data-api.hoyoverse.com
|
||||
0.0.0.0 dump.gamesafe.qq.com
|
||||
36
block_analytics.sh
Normal file
36
block_analytics.sh
Normal file
@ -0,0 +1,36 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
analytics_servers=$(cat <<EOF
|
||||
|
||||
# Honkai Impact 3rd analytics servers (glb/sea/tw/kr/jp):
|
||||
0.0.0.0 log-upload-os.hoyoverse.com
|
||||
0.0.0.0 sg-public-data-api.hoyoverse.com
|
||||
0.0.0.0 dump.gamesafe.qq.com
|
||||
|
||||
# Honkai Impact 3rd analytics servers (cn):
|
||||
0.0.0.0 log-upload.mihoyo.com
|
||||
0.0.0.0 public-data-api.mihoyo.com
|
||||
0.0.0.0 dump.gamesafe.qq.com
|
||||
|
||||
|
||||
# Honkai Star Rail analytics servers (os)
|
||||
0.0.0.0 log-upload-os.hoyoverse.com
|
||||
0.0.0.0 sg-public-data-api.hoyoverse.com
|
||||
|
||||
# Honkai Star Rail analytics servers (cn)
|
||||
0.0.0.0 log-upload.mihoyo.com
|
||||
0.0.0.0 public-data-api.mihoyo.com
|
||||
|
||||
EOF
|
||||
)
|
||||
|
||||
if [[ ! `cat /etc/hosts` == *"$analytics_servers"* ]]; then
|
||||
echo "Blocking analytics servers. This will require superuser privileges"
|
||||
echo "$analytics_servers" | pkexec tee -a /etc/hosts 2>&1 >> /dev/null
|
||||
if test $? -ne 0; then
|
||||
echo "Could not block analytics servers. Please add the following lines to your /etc/hosts manually:"
|
||||
echo "$analytics_servers"
|
||||
fi
|
||||
else
|
||||
echo "Analytics servers are already blocked"
|
||||
fi
|
||||
14
build.sh
14
build.sh
@ -1,18 +1,24 @@
|
||||
#!/usr/bin/env sh
|
||||
#!/usr/bin/env bash
|
||||
set -e
|
||||
|
||||
strip="x86_64-w64-mingw32-strip"
|
||||
|
||||
rm -f jadeite.zip
|
||||
rm -rf out
|
||||
|
||||
sh setup.sh
|
||||
ninja -C build
|
||||
sh setup.sh --buildtype=release
|
||||
meson compile -C build
|
||||
|
||||
mkdir out
|
||||
|
||||
cp ./build/injector/jadeite.exe ./out
|
||||
cp ./build/injector/launcher_payload/launcher_payload.dll ./out
|
||||
cp ./build/injector/launcher_payload.dll ./out
|
||||
cp ./build/game_payload/game_payload.dll ./out
|
||||
cp ./block_analytics.sh ./out
|
||||
cp ./LICENSE.txt ./out
|
||||
|
||||
$strip ./out/*.{exe,dll}
|
||||
|
||||
if [ "x$1" = "xrelease" ]; then
|
||||
cd out
|
||||
zip ../jadeite.zip *
|
||||
|
||||
BIN
game_payload/blob/core.o
Normal file
BIN
game_payload/blob/core.o
Normal file
Binary file not shown.
4
game_payload/copy_core.sh
Normal file
4
game_payload/copy_core.sh
Normal file
@ -0,0 +1,4 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
cp "$1" "$2"
|
||||
cp "$1" "$3"
|
||||
@ -2,7 +2,9 @@
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
void ace_fake_driver_files();
|
||||
|
||||
HMODULE ace_load_base_module(const char *exeName);
|
||||
HMODULE ace_load_base_module(struct game_data *game);
|
||||
HMODULE ace_load_driver_module();
|
||||
|
||||
1
game_payload/include/config.h.in
Normal file
1
game_payload/include/config.h.in
Normal file
@ -0,0 +1 @@
|
||||
#define JADEITE_VERSION "@version@"
|
||||
9
game_payload/include/core.h
Normal file
9
game_payload/include/core.h
Normal file
@ -0,0 +1,9 @@
|
||||
#pragma once
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
void core_setup_patcher(struct game_data *game, HMODULE baseModule, wchar_t *txFile);
|
||||
|
||||
void *core_perform_tx(struct game_data *game, size_t *outLength);
|
||||
@ -8,11 +8,13 @@
|
||||
/* CRC-32C (iSCSI) polynomial in reversed bit order. */
|
||||
#define __POLY 0x82f63b78
|
||||
|
||||
static inline uint32_t crc32c(uint32_t crc, const unsigned char *buf, size_t len) {
|
||||
static inline uint32_t crc32c(uint32_t crc, const void *buf, size_t len) {
|
||||
const unsigned char *cbuf = (const unsigned char*)buf;
|
||||
|
||||
crc = ~crc;
|
||||
|
||||
while (len--) {
|
||||
crc ^= *buf++;
|
||||
crc ^= *cbuf++;
|
||||
for (int k = 0; k < 8; k++) {
|
||||
crc = crc & 1 ? (crc >> 1) ^ __POLY : crc >> 1;
|
||||
}
|
||||
|
||||
@ -1,6 +0,0 @@
|
||||
#pragma once
|
||||
|
||||
#include <wchar.h>
|
||||
|
||||
void err_mb_a(const char *format, ...);
|
||||
void err_mb_w(const wchar_t *format, ...);
|
||||
@ -2,19 +2,20 @@
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
enum game_id {
|
||||
GAME_INVALID,
|
||||
#define INVOKE_CALLBACK(callback, ...) if (callback) { callback(__VA_ARGS__); }
|
||||
|
||||
GAME_HI3_GLB
|
||||
};
|
||||
typedef void (*unityplayer_callback_t)(HMODULE unityModule);
|
||||
|
||||
struct game_data {
|
||||
enum game_id id; // Temporary
|
||||
const char *name;
|
||||
const char *base_module_name;
|
||||
const char *assembly_path;
|
||||
const wchar_t *assembly_name_lwr;
|
||||
const char *tp6_section_name; // Unused for now
|
||||
const char *txs_section_name;
|
||||
const char *tvm_section_name;
|
||||
|
||||
unityplayer_callback_t unityplayer_callback;
|
||||
};
|
||||
|
||||
void game_detect(struct game_data *buf);
|
||||
|
||||
void hi3_fill_data(struct game_data *buf);
|
||||
void hsr_fill_data(struct game_data *buf);
|
||||
|
||||
@ -1,5 +0,0 @@
|
||||
#pragma once
|
||||
|
||||
#include <game.h>
|
||||
|
||||
void hi3_fill_data(struct game_data *buf);
|
||||
8
game_payload/include/main.h
Normal file
8
game_payload/include/main.h
Normal file
@ -0,0 +1,8 @@
|
||||
#pragma once
|
||||
|
||||
#define ISSUE_SUFFIX "Please open an issue on the jadeite repository specifying your game edition/region and version"
|
||||
|
||||
void unload_ctr_inc();
|
||||
void unload_ctr_dec();
|
||||
|
||||
void request_restart();
|
||||
12
game_payload/include/msg.h
Normal file
12
game_payload/include/msg.h
Normal file
@ -0,0 +1,12 @@
|
||||
#pragma once
|
||||
|
||||
#include <wchar.h>
|
||||
|
||||
void msg_err_a(const char *format, ...);
|
||||
void msg_err_w(const wchar_t *format, ...);
|
||||
|
||||
void msg_warn_a(const char *format, ...);
|
||||
void msg_warn_w(const wchar_t *format, ...);
|
||||
|
||||
void msg_info_a(const char *format, ...);
|
||||
void msg_info_w(const wchar_t *format, ...);
|
||||
@ -2,5 +2,6 @@
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
void pe_find_section(HMODULE module, const char *section, MEMORY_BASIC_INFORMATION *buf);
|
||||
IMAGE_SECTION_HEADER *pe_find_section(const void *module, const char *section);
|
||||
|
||||
void *pe_find_entry_point(HMODULE module);
|
||||
|
||||
@ -1,7 +0,0 @@
|
||||
#pragma once
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
void tp6_setup_patcher(struct game_data *game, HMODULE thisModule, HMODULE baseModule);
|
||||
3
game_payload/include/tx.h
Normal file
3
game_payload/include/tx.h
Normal file
@ -0,0 +1,3 @@
|
||||
#include <game.h>
|
||||
|
||||
void tx_table_file(struct game_data *game, wchar_t *buf);
|
||||
@ -2,4 +2,13 @@
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
uint32_t utils_file_crc32c(const char *filePath);
|
||||
#define UTILS_COUNT(arr) (sizeof(arr) / sizeof(*arr))
|
||||
|
||||
int utils_path_exists(const wchar_t *filePath);
|
||||
uint32_t utils_file_crc32c(const wchar_t *filePath);
|
||||
|
||||
void utils_create_parent_dirs(const wchar_t *path);
|
||||
|
||||
void utils_save_to_file(const wchar_t *filePath, const void *buf, size_t length);
|
||||
|
||||
char utils_env_enabled(const char *env);
|
||||
|
||||
@ -1,3 +1,7 @@
|
||||
fs = import('fs')
|
||||
|
||||
include_dir = include_directories('include')
|
||||
|
||||
# Input files
|
||||
sources = [
|
||||
'src/main.c',
|
||||
@ -5,30 +9,55 @@ sources = [
|
||||
'src/ace.c',
|
||||
'src/pe.c',
|
||||
'src/game.c',
|
||||
'src/hi3.c',
|
||||
'src/utils.c',
|
||||
'src/err.c',
|
||||
'src/msg.c',
|
||||
'src/tx.c',
|
||||
|
||||
# File withheld to make abuse more difficult
|
||||
'src/tp6.c'
|
||||
]
|
||||
resources = [
|
||||
'res/hi3/glb/allocations.dat',
|
||||
'res/hi3/glb/entries.dat'
|
||||
'src/hi3/hi3.c',
|
||||
|
||||
'src/hsr/hsr.c'
|
||||
]
|
||||
|
||||
# Generate resource files for ./res
|
||||
res_files = custom_target(
|
||||
'resources.[ho]',
|
||||
output: [ 'resources.o', 'resources.h' ],
|
||||
input: resources,
|
||||
command: [ gen_res, meson.current_source_dir(), '@OUTPUT0@', '@OUTPUT1@', '@INPUT@' ]
|
||||
)
|
||||
if fs.exists('src/core.c')
|
||||
# Compile the real file first (dirty hack)
|
||||
core_fake_exe = executable(
|
||||
'core.o',
|
||||
'src/core.c',
|
||||
link_args: [ '-r' ], # Output an object file
|
||||
include_directories: include_dir
|
||||
)
|
||||
|
||||
# another dirty hack
|
||||
copy_core = find_program('copy_core.sh')
|
||||
|
||||
core_target = [custom_target(
|
||||
'copy_core',
|
||||
output: 'core.o',
|
||||
input: core_fake_exe.extract_all_objects(recursive: false),
|
||||
command: [
|
||||
copy_core,
|
||||
'@INPUT0@',
|
||||
'@OUTPUT0@', meson.current_source_dir() / 'blob/core.o'
|
||||
]
|
||||
)]
|
||||
core_blob = []
|
||||
else
|
||||
message('Using precompiled core blob. Refer to the readme for more details')
|
||||
core_target = []
|
||||
core_blob = [ 'blob/core.o' ]
|
||||
endif
|
||||
|
||||
conf_data = configuration_data()
|
||||
conf_data.set('version', meson.project_version())
|
||||
|
||||
conf = configure_file(input: 'include/config.h.in', output: 'config.h', configuration: conf_data)
|
||||
|
||||
shared_library(
|
||||
'game_payload',
|
||||
sources,
|
||||
res_files,
|
||||
include_directories: 'include',
|
||||
core_target,
|
||||
conf,
|
||||
objects: core_blob,
|
||||
include_directories: include_dir,
|
||||
name_prefix: ''
|
||||
)
|
||||
|
||||
Binary file not shown.
Binary file not shown.
@ -1,6 +1,6 @@
|
||||
#include <ntdll.h>
|
||||
#include <pe.h>
|
||||
#include <err.h>
|
||||
#include <msg.h>
|
||||
|
||||
#include <ace.h>
|
||||
|
||||
@ -9,14 +9,13 @@ static void _dll_notification(ULONG reason, const PLDR_DLL_NOTIFICATION_DATA dat
|
||||
return;
|
||||
}
|
||||
|
||||
// context should be set to the target module name, lowercase
|
||||
// context should be set to the target module name
|
||||
wchar_t *targetModuleName = (wchar_t*)context;
|
||||
|
||||
wchar_t lwModuleName[MAX_PATH];
|
||||
wcscpy(lwModuleName, data->Loaded.BaseDllName->Buffer);
|
||||
_wcslwr(lwModuleName);
|
||||
if (wcsicmp(targetModuleName, data->Loaded.BaseDllName->Buffer) != 0) {
|
||||
return;
|
||||
}
|
||||
|
||||
if (wcscmp(targetModuleName, lwModuleName) == 0) {
|
||||
// Replace entry point with a stub
|
||||
void *entryPoint = pe_find_entry_point(data->Loaded.DllBase);
|
||||
|
||||
@ -31,61 +30,53 @@ static void _dll_notification(ULONG reason, const PLDR_DLL_NOTIFICATION_DATA dat
|
||||
memcpy(entryPoint, ENTRY_POINT_STUB, sizeof(ENTRY_POINT_STUB));
|
||||
|
||||
VirtualProtect(entryPoint, sizeof(ENTRY_POINT_STUB), oldProtect, &oldProtect);
|
||||
|
||||
}
|
||||
|
||||
static void _create_driver_file(const char *path) {
|
||||
// They only report presence
|
||||
HANDLE file = CreateFileA(path, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
|
||||
if (file == INVALID_HANDLE_VALUE) {
|
||||
msg_err_a("Could not create driver file: %s", path);
|
||||
}
|
||||
|
||||
CloseHandle(file);
|
||||
}
|
||||
|
||||
void ace_fake_driver_files() {
|
||||
// They only report presence
|
||||
const char *wdDriverPath = "ACE-BASE.sys";
|
||||
const char *s32DriverPath = "C:\\windows\\system32\\drivers\\ACE-BASE.sys";
|
||||
|
||||
HANDLE wdDriverFile = CreateFileA(wdDriverPath, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
if (!wdDriverFile) {
|
||||
err_mb_a("Could not create driver file: %s", wdDriverPath);
|
||||
}
|
||||
_create_driver_file("ACE-BASE.sys");
|
||||
|
||||
// Just in case
|
||||
HANDLE s32DriverFile = CreateFileA(s32DriverPath, GENERIC_WRITE, FILE_SHARE_READ, NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
if (!s32DriverFile) {
|
||||
err_mb_a("Could not create driver file: %s", s32DriverPath);
|
||||
}
|
||||
|
||||
CloseHandle(wdDriverFile);
|
||||
CloseHandle(s32DriverFile);
|
||||
_create_driver_file("C:\\windows\\system32\\drivers\\ACE-BASE.sys");
|
||||
}
|
||||
|
||||
HMODULE ace_load_base_module(const char *exeName) {
|
||||
wchar_t baseModuleName[MAX_PATH];
|
||||
swprintf(baseModuleName, MAX_PATH, L"%sbase.dll", exeName);
|
||||
wcslwr(baseModuleName);
|
||||
static HMODULE _load_module_patched(wchar_t *path) {
|
||||
// Get filename from the path
|
||||
wchar_t *name = wcsrchr(path, '\\');
|
||||
name = name ? name + 1 : path;
|
||||
|
||||
void *cookie;
|
||||
LdrRegisterDllNotification(0, &_dll_notification, baseModuleName, &cookie);
|
||||
LdrRegisterDllNotification(0, &_dll_notification, name, &cookie);
|
||||
|
||||
HMODULE baseModule = LoadLibraryW(baseModuleName);
|
||||
if (!baseModule) {
|
||||
err_mb_w(L"Could not load base module: %ls", baseModuleName);
|
||||
HMODULE module = LoadLibraryW(path);
|
||||
if (!module) {
|
||||
msg_err_w(L"Could not load module: %ls", path);
|
||||
}
|
||||
|
||||
// LoadLibraryA is synchronous; the notification function has already finished executing
|
||||
// LoadLibraryW is synchronous; the notification function has already finished executing
|
||||
LdrUnregisterDllNotification(cookie);
|
||||
|
||||
return baseModule;
|
||||
return module;
|
||||
}
|
||||
|
||||
HMODULE ace_load_base_module(struct game_data *game) {
|
||||
wchar_t baseModuleName[MAX_PATH];
|
||||
MultiByteToWideChar(CP_UTF8, 0, game->base_module_name, strlen(game->base_module_name) + 1, baseModuleName, MAX_PATH);
|
||||
|
||||
return _load_module_patched(baseModuleName);
|
||||
}
|
||||
|
||||
HMODULE ace_load_driver_module() {
|
||||
const char *driverModulePath = "AntiCheatExpert/InGame/x64/ACE-DRV64.dll";
|
||||
|
||||
void *cookie;
|
||||
LdrRegisterDllNotification(0, &_dll_notification, L"ace-drv64.dll", &cookie);
|
||||
|
||||
HMODULE driverModule = LoadLibraryA(driverModulePath);
|
||||
if (!driverModule) {
|
||||
err_mb_a("Could not load driver module: %s", driverModulePath);
|
||||
}
|
||||
|
||||
// LoadLibraryA is synchronous; the notification function has already finished executing
|
||||
LdrUnregisterDllNotification(cookie);
|
||||
|
||||
return driverModule;
|
||||
return _load_module_patched(L"AntiCheatExpert\\InGame\\x64\\ACE-DRV64.dll");
|
||||
}
|
||||
|
||||
31
game_payload/src/core.md
Normal file
31
game_payload/src/core.md
Normal file
@ -0,0 +1,31 @@
|
||||
### 1.0.0
|
||||
- First version
|
||||
|
||||
### 1.1.0
|
||||
- HSR support
|
||||
|
||||
### 1.1.9
|
||||
- Fixed a bug which could cause the game to crash in odd scenarios
|
||||
|
||||
### 1.1.10
|
||||
- Fixed a subtle bug introduced in 1.1.9
|
||||
|
||||
### 1.1.11
|
||||
- Fixed an additional issue introduced in 1.1.9
|
||||
|
||||
### 2.0.0
|
||||
- Almost a full rewrite, functionality unchanged
|
||||
- Added support for HI3 sea/cn/tw/jp/kr
|
||||
|
||||
### 3.0.0
|
||||
- Integrated table extractor
|
||||
|
||||
### 3.0.1
|
||||
- Fixed a bug that caused HI3 to crash
|
||||
|
||||
### 3.0.2
|
||||
- Fixed multiple error messageboxes showing invalid characters
|
||||
- Added handling for more error conditions
|
||||
|
||||
### 3.0.4
|
||||
- Moved LoadLibrary call into core from main
|
||||
@ -1,26 +0,0 @@
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#include <err.h>
|
||||
|
||||
#define DEF_ERROR_FN(name, type, printfn, mbfn, projname) \
|
||||
void name(const type *format, ...) { \
|
||||
va_list args; \
|
||||
va_start(args, format); \
|
||||
\
|
||||
int count = printfn(NULL, 0, format, args) + 1; \
|
||||
\
|
||||
type *buf = malloc(count * sizeof(type)); \
|
||||
printfn(buf, count, format, args); \
|
||||
\
|
||||
mbfn(NULL, buf, projname, MB_OK | MB_ICONERROR); \
|
||||
\
|
||||
va_end(args); \
|
||||
\
|
||||
free(buf); \
|
||||
exit(1); \
|
||||
}
|
||||
|
||||
|
||||
DEF_ERROR_FN(err_mb_a, char, _vsnprintf, MessageBoxA, "Jadeite Autopatcher")
|
||||
DEF_ERROR_FN(err_mb_w, wchar_t, _vsnwprintf, MessageBoxW, L"Jadeite Autopatcher")
|
||||
@ -1,19 +1,39 @@
|
||||
#include <err.h>
|
||||
#include <hi3.h>
|
||||
#include <msg.h>
|
||||
#include <utils.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
typedef void (*fill_fn)(struct game_data *buf);
|
||||
|
||||
struct name_fn_pair {
|
||||
const wchar_t *name;
|
||||
fill_fn fill;
|
||||
};
|
||||
|
||||
const struct name_fn_pair GAMES[] = {
|
||||
{ L"BH3", &hi3_fill_data },
|
||||
{ L"StarRail", &hsr_fill_data }
|
||||
};
|
||||
|
||||
void game_detect(struct game_data *buf) {
|
||||
wchar_t exePath[MAX_PATH];
|
||||
GetModuleFileNameW(NULL, exePath, MAX_PATH);
|
||||
|
||||
// Leave only the basename
|
||||
wchar_t *exeName = wcsrchr(exePath, L'\\') + 1;
|
||||
wcslwr(exeName);
|
||||
|
||||
// Only HI3 is supported for now
|
||||
if (wcscmp(exeName, L"bh3.exe") == 0) {
|
||||
hi3_fill_data(buf);
|
||||
} else {
|
||||
err_mb_w(L"Unknown game: %ls", exeName);
|
||||
// Cut off extension (.exe)
|
||||
wchar_t *extensionDot = wcsrchr(exeName, L'.');
|
||||
if (extensionDot != NULL) {
|
||||
*extensionDot = L'\0';
|
||||
}
|
||||
|
||||
for (size_t i = 0; i < UTILS_COUNT(GAMES); i++) {
|
||||
if (wcsicmp(exeName, GAMES[i].name) == 0) {
|
||||
GAMES[i].fill(buf);
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
msg_err_w(L"Unknown game: %ls", exeName);
|
||||
}
|
||||
|
||||
@ -1,44 +0,0 @@
|
||||
#include <utils.h>
|
||||
#include <err.h>
|
||||
|
||||
#include <hi3.h>
|
||||
|
||||
const char *HI3_NAME = "BH3";
|
||||
const char *HI3_ASSEMBLY_PATH = "BH3_Data/Native/UserAssembly.dll";
|
||||
const wchar_t *HI3_ASSEMBLY_NAME_LWR = L"userassembly.dll";
|
||||
const char *HI3_TP6_SECTION_NAME = ".bh3";
|
||||
const char *HI3_TVM_SECTION_NAME = ".tvm0";
|
||||
|
||||
struct crc_id_pair {
|
||||
uint32_t crc;
|
||||
enum game_id id;
|
||||
};
|
||||
|
||||
const struct crc_id_pair HI3_REGIONS[] = {
|
||||
// Only glb for now
|
||||
// It may be possible to get rid of region-specific data altogether in the future
|
||||
|
||||
{ 0x34bdec99, GAME_HI3_GLB } // glb v6.6.0
|
||||
};
|
||||
|
||||
void hi3_fill_data(struct game_data *buf) {
|
||||
uint32_t crc = utils_file_crc32c("UnityPlayer.dll");
|
||||
|
||||
enum game_id id = GAME_INVALID;
|
||||
for (size_t i = 0; i < sizeof(HI3_REGIONS) / sizeof(struct crc_id_pair); i++) {
|
||||
if (HI3_REGIONS[i].crc == crc) {
|
||||
id = HI3_REGIONS[i].id;
|
||||
}
|
||||
}
|
||||
|
||||
if (id == GAME_INVALID) {
|
||||
err_mb_a("Invalid UnityPlayer.dll checksum: %d", crc);
|
||||
}
|
||||
|
||||
buf->id = id;
|
||||
buf->name = HI3_NAME;
|
||||
buf->assembly_path = HI3_ASSEMBLY_PATH;
|
||||
buf->assembly_name_lwr = HI3_ASSEMBLY_NAME_LWR;
|
||||
buf->tp6_section_name = HI3_TP6_SECTION_NAME;
|
||||
buf->tvm_section_name = HI3_TVM_SECTION_NAME;
|
||||
}
|
||||
21
game_payload/src/hi3/hi3.c
Normal file
21
game_payload/src/hi3/hi3.c
Normal file
@ -0,0 +1,21 @@
|
||||
#include <utils.h>
|
||||
#include <msg.h>
|
||||
#include <pe.h>
|
||||
#include <main.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
const char *HI3_BASE_MODULE_NAME = "BH3Base.dll";
|
||||
const char *HI3_ASSEMBLY_PATH = "BH3_Data\\Native\\UserAssembly.dll";
|
||||
const char *HI3_TXS_SECTION_NAME = ".ace";
|
||||
const char *HI3_TVM_SECTION_NAME = ".tvm0";
|
||||
|
||||
|
||||
void hi3_fill_data(struct game_data *buf) {
|
||||
buf->base_module_name = HI3_BASE_MODULE_NAME;
|
||||
buf->assembly_path = HI3_ASSEMBLY_PATH;
|
||||
buf->txs_section_name = HI3_TXS_SECTION_NAME;
|
||||
buf->tvm_section_name = HI3_TVM_SECTION_NAME;
|
||||
|
||||
buf->unityplayer_callback = NULL;
|
||||
}
|
||||
100
game_payload/src/hsr/hsr.c
Normal file
100
game_payload/src/hsr/hsr.c
Normal file
@ -0,0 +1,100 @@
|
||||
#include <utils.h>
|
||||
#include <msg.h>
|
||||
#include <main.h>
|
||||
|
||||
#include <game.h>
|
||||
|
||||
const char *HSR_BASE_MODULE_NAME = "StarRailBase.dll";
|
||||
const char *HSR_ASSEMBLY_PATH = "GameAssembly.dll";
|
||||
const char *HSR_TXS_SECTION_NAME = ".ace";
|
||||
const char *HSR_TVM_SECTION_NAME = ".tvm0";
|
||||
|
||||
#define HSR_VERSION "1.6.0"
|
||||
|
||||
enum hsr_region {
|
||||
HSR_INVALID,
|
||||
HSR_OS,
|
||||
HSR_CN
|
||||
};
|
||||
|
||||
struct crc_region_pair {
|
||||
uint32_t crc;
|
||||
enum hsr_region id;
|
||||
};
|
||||
|
||||
const struct crc_region_pair HSR_REGIONS[] = {
|
||||
{ 0x5741ce50, HSR_OS }, // os v1.6.0
|
||||
{ 0xce891f97, HSR_CN } // cn v1.6.0
|
||||
};
|
||||
|
||||
#define JUMP_SIZE (6 + sizeof(void*))
|
||||
|
||||
// Temporarily hardcoded offset
|
||||
// v1.6.0, same for os and cn
|
||||
#define WTSUD_PATCH_OFFSET 0x16510
|
||||
|
||||
char wtsud_original_bytes[JUMP_SIZE];
|
||||
char *wtsud_patch_addr;
|
||||
|
||||
static void _wtsud_stub() {
|
||||
// Recover original bytes
|
||||
DWORD oldProtect;
|
||||
VirtualProtect(wtsud_patch_addr, JUMP_SIZE, PAGE_EXECUTE_READWRITE, &oldProtect);
|
||||
|
||||
memcpy(wtsud_patch_addr, wtsud_original_bytes, JUMP_SIZE);
|
||||
|
||||
VirtualProtect(wtsud_patch_addr, JUMP_SIZE, oldProtect, &oldProtect);
|
||||
|
||||
unload_ctr_dec();
|
||||
}
|
||||
|
||||
static void _unityplayer_callback(HMODULE unityModule) {
|
||||
if (utils_env_enabled("CHECKSUM_PATCH_DISABLE")) {
|
||||
msg_info_a("DirectX library verification patch disabled. The game will not work");
|
||||
return;
|
||||
}
|
||||
|
||||
// Remove check by patching WriteTextureStatisticUserData
|
||||
unload_ctr_inc();
|
||||
|
||||
wtsud_patch_addr = ((char*)unityModule) + WTSUD_PATCH_OFFSET;
|
||||
|
||||
DWORD oldProtect;
|
||||
VirtualProtect(wtsud_patch_addr, JUMP_SIZE, PAGE_EXECUTE_READWRITE, &oldProtect);
|
||||
|
||||
// Save original bytes
|
||||
memcpy(wtsud_original_bytes, wtsud_patch_addr, JUMP_SIZE);
|
||||
|
||||
// Write jump
|
||||
const char JUMP_INST[] = { 0xFF, 0x25, 0x00, 0x00, 0x00, 0x00 }; // jmp [$ + 6]
|
||||
memcpy(wtsud_patch_addr, JUMP_INST, sizeof(JUMP_INST));
|
||||
|
||||
// Write destination address
|
||||
void *destAddr = &_wtsud_stub;
|
||||
memcpy(wtsud_patch_addr + sizeof(JUMP_INST), &destAddr, sizeof(destAddr));
|
||||
|
||||
VirtualProtect(wtsud_patch_addr, JUMP_SIZE, oldProtect, &oldProtect);
|
||||
}
|
||||
|
||||
void hsr_fill_data(struct game_data *buf) {
|
||||
uint32_t crc = utils_file_crc32c(L"UnityPlayer.dll");
|
||||
|
||||
enum hsr_region id = HSR_INVALID;
|
||||
for (size_t i = 0; i < UTILS_COUNT(HSR_REGIONS); i++) {
|
||||
if (HSR_REGIONS[i].crc == crc) {
|
||||
id = HSR_REGIONS[i].id;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (id == HSR_INVALID) {
|
||||
msg_err_a("Invalid UnityPlayer.dll checksum: 0x%08x. This patch is intended to be used with HSR v" HSR_VERSION, crc);
|
||||
}
|
||||
|
||||
buf->base_module_name = HSR_BASE_MODULE_NAME;
|
||||
buf->assembly_path = HSR_ASSEMBLY_PATH;
|
||||
buf->txs_section_name = HSR_TXS_SECTION_NAME;
|
||||
buf->tvm_section_name = HSR_TVM_SECTION_NAME;
|
||||
|
||||
buf->unityplayer_callback = &_unityplayer_callback;
|
||||
}
|
||||
@ -3,8 +3,69 @@
|
||||
#include <ntdll.h>
|
||||
#include <ace.h>
|
||||
#include <game.h>
|
||||
#include <tp6.h>
|
||||
#include <core.h>
|
||||
#include <utils.h>
|
||||
#include <msg.h>
|
||||
#include <tx.h>
|
||||
|
||||
#include <main.h>
|
||||
|
||||
HMODULE this_module;
|
||||
size_t unload_ctr = 0;
|
||||
|
||||
void unload_ctr_inc() {
|
||||
unload_ctr++;
|
||||
}
|
||||
|
||||
void unload_ctr_dec() {
|
||||
unload_ctr--;
|
||||
if (unload_ctr == 0) {
|
||||
void *pFreeLibrary = GetProcAddress(GetModuleHandleA("kernel32.dll"), "FreeLibrary");
|
||||
CreateThread(NULL, 0, pFreeLibrary, this_module, 0, NULL);
|
||||
}
|
||||
}
|
||||
|
||||
void request_restart() {
|
||||
wchar_t restartFlagFile[MAX_PATH];
|
||||
GetTempPathW(MAX_PATH, restartFlagFile);
|
||||
wcscat(restartFlagFile, L"jadeite\\restart_flag");
|
||||
|
||||
HANDLE hRestartFlag = CreateFileW(restartFlagFile, FILE_WRITE_ACCESS, FILE_SHARE_READ, NULL, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
CloseHandle(hRestartFlag);
|
||||
}
|
||||
|
||||
static void _run_game(struct game_data *game, wchar_t *txFile) {
|
||||
// Create fake ACE driver files
|
||||
ace_fake_driver_files();
|
||||
|
||||
// Load both ACE modules
|
||||
HMODULE baseModule = ace_load_base_module(game);
|
||||
ace_load_driver_module();
|
||||
|
||||
// ...magic
|
||||
core_setup_patcher(game, baseModule, txFile);
|
||||
|
||||
// Load the UnityPlayer module and invoke the callback
|
||||
HMODULE unityModule = LoadLibraryA("UnityPlayer.dll");
|
||||
INVOKE_CALLBACK(game->unityplayer_callback, unityModule);
|
||||
}
|
||||
|
||||
static void _run_tx(struct game_data *game, wchar_t *txFile) {
|
||||
// ...more magic
|
||||
size_t tableSize;
|
||||
void *table = core_perform_tx(game, &tableSize);
|
||||
|
||||
// Save to file
|
||||
utils_create_parent_dirs(txFile);
|
||||
utils_save_to_file(txFile, table, tableSize);
|
||||
|
||||
// Cleanup
|
||||
free(table);
|
||||
|
||||
// The file should now exist: restart and launch the game
|
||||
request_restart();
|
||||
exit(0);
|
||||
}
|
||||
|
||||
BOOL WINAPI DllMain(HINSTANCE instance, DWORD reason, LPVOID reserved) {
|
||||
// Only listen to attach
|
||||
@ -12,6 +73,8 @@ BOOL WINAPI DllMain(HINSTANCE instance, DWORD reason, LPVOID reserved) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
this_module = instance;
|
||||
|
||||
// Dynamically link functions from ntdll
|
||||
ntdll_link();
|
||||
|
||||
@ -19,15 +82,15 @@ BOOL WINAPI DllMain(HINSTANCE instance, DWORD reason, LPVOID reserved) {
|
||||
struct game_data game;
|
||||
game_detect(&game);
|
||||
|
||||
// Create fake ACE driver files
|
||||
ace_fake_driver_files();
|
||||
// Get required table file path
|
||||
wchar_t txFile[MAX_PATH];
|
||||
tx_table_file(&game, txFile);
|
||||
|
||||
// Load both ACE modules
|
||||
HMODULE baseModule = ace_load_base_module(game.name);
|
||||
ace_load_driver_module();
|
||||
|
||||
// ...magic
|
||||
tp6_setup_patcher(&game, instance, baseModule);
|
||||
if (utils_path_exists(txFile)) {
|
||||
_run_game(&game, txFile);
|
||||
} else {
|
||||
_run_tx(&game, txFile);
|
||||
}
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
38
game_payload/src/msg.c
Normal file
38
game_payload/src/msg.c
Normal file
@ -0,0 +1,38 @@
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
#include <config.h>
|
||||
|
||||
#include <msg.h>
|
||||
|
||||
#define DEF_MSG_FN(name, type, printfn, mbfn, projname, flags, suffix) \
|
||||
void name(const type *format, ...) { \
|
||||
va_list args; \
|
||||
va_start(args, format); \
|
||||
\
|
||||
int count = printfn(NULL, 0, format, args) + 1; \
|
||||
\
|
||||
type *buf = malloc(count * sizeof(type)); \
|
||||
printfn(buf, count, format, args); \
|
||||
\
|
||||
mbfn(NULL, buf, projname, flags); \
|
||||
\
|
||||
va_end(args); \
|
||||
\
|
||||
free(buf); \
|
||||
suffix; \
|
||||
}
|
||||
|
||||
const char *TITLE_A = "v" JADEITE_VERSION " Jadeite Autopatcher";
|
||||
const wchar_t *TITLE_W = L"v" JADEITE_VERSION " Jadeite Autopatcher";
|
||||
|
||||
// Error
|
||||
DEF_MSG_FN(msg_err_a, char, _vsnprintf, MessageBoxA, TITLE_A, MB_OK | MB_ICONERROR, exit(1))
|
||||
DEF_MSG_FN(msg_err_w, wchar_t, _vsnwprintf, MessageBoxW, TITLE_W, MB_OK | MB_ICONERROR, exit(1))
|
||||
|
||||
// Warn
|
||||
DEF_MSG_FN(msg_warn_a, char, _vsnprintf, MessageBoxA, TITLE_A, MB_OK | MB_ICONEXCLAMATION,)
|
||||
DEF_MSG_FN(msg_warn_w, wchar_t, _vsnwprintf, MessageBoxW, TITLE_W, MB_OK | MB_ICONEXCLAMATION,)
|
||||
|
||||
// Info
|
||||
DEF_MSG_FN(msg_info_a, char, _vsnprintf, MessageBoxA, TITLE_A, MB_OK | MB_ICONINFORMATION,)
|
||||
DEF_MSG_FN(msg_info_w, wchar_t, _vsnwprintf, MessageBoxW, TITLE_W, MB_OK | MB_ICONINFORMATION,)
|
||||
@ -1,27 +1,23 @@
|
||||
#include <stdint.h>
|
||||
|
||||
#include <pe.h>
|
||||
|
||||
void pe_find_section(HMODULE module, const char *section, MEMORY_BASIC_INFORMATION *buf) {
|
||||
char *cModule = (char*)module;
|
||||
IMAGE_SECTION_HEADER *pe_find_section(const void *module, const char *section) {
|
||||
const char *cModule = (const char*)module;
|
||||
|
||||
IMAGE_DOS_HEADER* dosHeader = (IMAGE_DOS_HEADER*)module;
|
||||
IMAGE_NT_HEADERS64* ntHeaders = (IMAGE_NT_HEADERS64*)(cModule + dosHeader->e_lfanew);
|
||||
|
||||
uint16_t sectionCount = ntHeaders->FileHeader.NumberOfSections;
|
||||
WORD sectionCount = ntHeaders->FileHeader.NumberOfSections;
|
||||
IMAGE_SECTION_HEADER* sectionHeader = (IMAGE_SECTION_HEADER*)(ntHeaders + 1);
|
||||
|
||||
void* targetAddress = 0x0;
|
||||
for (uint16_t i = 0; i < sectionCount; i++) {
|
||||
for (WORD i = 0; i < sectionCount; i++) {
|
||||
if (strncmp((char*)sectionHeader->Name, section, 8) == 0) {
|
||||
targetAddress = (void*)(cModule + sectionHeader->VirtualAddress);
|
||||
break;
|
||||
return sectionHeader;
|
||||
}
|
||||
|
||||
sectionHeader++;
|
||||
}
|
||||
|
||||
VirtualQuery(targetAddress, buf, sizeof(MEMORY_BASIC_INFORMATION));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
void *pe_find_entry_point(HMODULE module) {
|
||||
|
||||
@ -1,2 +0,0 @@
|
||||
### 1.0.0
|
||||
- First version
|
||||
44
game_payload/src/tx.c
Normal file
44
game_payload/src/tx.c
Normal file
@ -0,0 +1,44 @@
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#include <crc32.h>
|
||||
#include <msg.h>
|
||||
#include <pe.h>
|
||||
#include <main.h>
|
||||
#include <config.h>
|
||||
|
||||
#include <tx.h>
|
||||
|
||||
void tx_table_file(struct game_data *game, wchar_t *buf) {
|
||||
// Get temp directory path
|
||||
wchar_t tempDir[MAX_PATH];
|
||||
GetTempPathW(MAX_PATH, tempDir);
|
||||
|
||||
// Memorymap the base module
|
||||
HANDLE baseFile = CreateFileA(game->base_module_name, FILE_READ_ACCESS, FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
if (!baseFile) {
|
||||
msg_err_a("Could not open file: %s", game->base_module_name);
|
||||
}
|
||||
|
||||
HANDLE hBaseMap = CreateFileMappingA(baseFile, NULL, PAGE_READONLY, 0, 0, NULL);
|
||||
char *baseMap = MapViewOfFile(hBaseMap, FILE_MAP_READ, 0, 0, 0);
|
||||
if (!baseMap) {
|
||||
msg_err_a("Could not create file mapping for %s", game->base_module_name);
|
||||
}
|
||||
|
||||
// Checksum the TXS section
|
||||
IMAGE_SECTION_HEADER *txsSection = pe_find_section(baseMap, game->txs_section_name);
|
||||
if (!txsSection) {
|
||||
msg_err_a("Could not find %s in %s. " ISSUE_SUFFIX, game->txs_section_name, game->base_module_name);
|
||||
}
|
||||
|
||||
uint32_t txsChecksum = crc32c(0, baseMap + txsSection->PointerToRawData, txsSection->SizeOfRawData);
|
||||
|
||||
// Format the path
|
||||
wsprintfW(buf, L"%sjadeite\\" JADEITE_VERSION "\\%hs.%x.dat", tempDir, game->base_module_name, txsChecksum);
|
||||
|
||||
// Cleanup
|
||||
UnmapViewOfFile(baseMap);
|
||||
CloseHandle(hBaseMap);
|
||||
CloseHandle(baseFile);
|
||||
}
|
||||
@ -1,14 +1,18 @@
|
||||
#include <windows.h>
|
||||
|
||||
#include <crc32.h>
|
||||
#include <err.h>
|
||||
#include <msg.h>
|
||||
|
||||
#include <utils.h>
|
||||
|
||||
uint32_t utils_file_crc32c(const char *filePath) {
|
||||
HANDLE file = CreateFileA(filePath, FILE_READ_ACCESS, FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
int utils_path_exists(const wchar_t *filePath) {
|
||||
return GetFileAttributesW(filePath) != INVALID_FILE_ATTRIBUTES;
|
||||
}
|
||||
|
||||
uint32_t utils_file_crc32c(const wchar_t *filePath) {
|
||||
HANDLE file = CreateFileW(filePath, FILE_READ_ACCESS, FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
if (!file) {
|
||||
err_mb_a("Could not open file: %s", filePath);
|
||||
msg_err_w(L"Could not open file: %ls", filePath);
|
||||
}
|
||||
|
||||
LARGE_INTEGER fileSize;
|
||||
@ -17,10 +21,10 @@ uint32_t utils_file_crc32c(const char *filePath) {
|
||||
HANDLE hMap = CreateFileMappingA(file, NULL, PAGE_READONLY, 0, 0, NULL);
|
||||
char *map = MapViewOfFile(hMap, FILE_MAP_READ, 0, 0, 0);
|
||||
if (!map) {
|
||||
err_mb_a("Could not create file mapping for %s", filePath);
|
||||
msg_err_w(L"Could not create file mapping for %ls", filePath);
|
||||
}
|
||||
|
||||
uint32_t crc = crc32c(0, (unsigned char*)map, fileSize.QuadPart);
|
||||
uint32_t crc = crc32c(0, map, fileSize.QuadPart);
|
||||
|
||||
UnmapViewOfFile(map);
|
||||
CloseHandle(hMap);
|
||||
@ -28,3 +32,35 @@ uint32_t utils_file_crc32c(const char *filePath) {
|
||||
|
||||
return crc;
|
||||
}
|
||||
|
||||
// https://stackoverflow.com/a/16719260
|
||||
void utils_create_parent_dirs(const wchar_t *path) {
|
||||
wchar_t dir[MAX_PATH];
|
||||
ZeroMemory(dir, sizeof(dir));
|
||||
|
||||
const wchar_t *end = path - 1;
|
||||
|
||||
while((end = wcschr(++end, L'\\')) != NULL) {
|
||||
wcsncpy(dir, path, end - path + 1);
|
||||
|
||||
if (!utils_path_exists(dir) && !CreateDirectoryW(dir, NULL)) {
|
||||
msg_err_w(L"Failed to create directory: %ls", dir);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void utils_save_to_file(const wchar_t *filePath, const void *buf, size_t length) {
|
||||
HANDLE file = CreateFileW(filePath, FILE_WRITE_ACCESS, FILE_SHARE_READ, NULL, CREATE_NEW, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
if (!file) {
|
||||
msg_err_w(L"Could not open file: %ls", filePath);
|
||||
}
|
||||
|
||||
WriteFile(file, buf, length, NULL, FALSE);
|
||||
|
||||
CloseHandle(file);
|
||||
}
|
||||
|
||||
char utils_env_enabled(const char *env) {
|
||||
char *envText = getenv(env);
|
||||
return envText && *envText;
|
||||
}
|
||||
|
||||
@ -2,19 +2,38 @@
|
||||
|
||||
linker="x86_64-w64-mingw32-ld"
|
||||
|
||||
# Select output types
|
||||
for i in {0..1}
|
||||
do
|
||||
case "$1" in
|
||||
--header)
|
||||
gen_header=1
|
||||
shift
|
||||
;;
|
||||
--object)
|
||||
gen_object=1
|
||||
shift
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
# Read project directory
|
||||
proj_dir=`realpath "$1"`
|
||||
shift
|
||||
|
||||
# Read output file destinations
|
||||
resources_o=`realpath "$1"`
|
||||
shift
|
||||
resources_h=`realpath "$1"`
|
||||
shift
|
||||
# Read output file destinations and make sure they don't exist
|
||||
if [ "x${gen_object}" = "x1" ]; then
|
||||
resources_o=`realpath "$1"`
|
||||
shift
|
||||
|
||||
# Make sure that the header does not exist
|
||||
rm -f "${resources_h}"
|
||||
rm -f "${resources_o}"
|
||||
rm -f "${resources_h}"
|
||||
fi
|
||||
if [ "x${gen_header}" = "x1" ]; then
|
||||
resources_h=`realpath "$1"`
|
||||
shift
|
||||
|
||||
rm -f "${resources_o}"
|
||||
fi
|
||||
|
||||
# Recomupte relative paths to parameters
|
||||
idx=0
|
||||
@ -26,16 +45,19 @@ do
|
||||
idx="$(("${idx}" + 1))"
|
||||
done
|
||||
|
||||
# Create the object file
|
||||
pushd "${proj_dir}" >> /dev/null
|
||||
$linker -r -b binary -o "${resources_o}" "${resource_files[@]}"
|
||||
popd >> /dev/null
|
||||
if [ "x${gen_object}" = "x1" ]; then
|
||||
# Create the object file
|
||||
pushd "${proj_dir}" >> /dev/null
|
||||
$linker -r -b binary -o "${resources_o}" "${resource_files[@]}"
|
||||
popd >> /dev/null
|
||||
fi
|
||||
|
||||
# Include stddef.h in the resources header (for size_t)
|
||||
echo "#include <stddef.h>" >> "${resources_h}"
|
||||
if [ "x${gen_header}" = "x1" ]; then
|
||||
# Include stddef.h in the resources header (for size_t)
|
||||
echo "#include <stddef.h>" >> "${resources_h}"
|
||||
|
||||
for resource in "${resource_files[@]}"
|
||||
do
|
||||
for resource in "${resource_files[@]}"
|
||||
do
|
||||
# Use relative path to the resource as the variable name
|
||||
var_name="_binary_${resource}"
|
||||
|
||||
@ -46,4 +68,5 @@ do
|
||||
echo "extern void *${var_name}_start;" >> "${resources_h}"
|
||||
echo "extern void *${var_name}_size;" >> "${resources_h}"
|
||||
echo "" >> "${resources_h}"
|
||||
done
|
||||
done
|
||||
fi
|
||||
|
||||
7
injector/include/envs.h
Normal file
7
injector/include/envs.h
Normal file
@ -0,0 +1,7 @@
|
||||
#pragma once
|
||||
|
||||
#define EPFX L"__JADEITE_"
|
||||
|
||||
#define ENV_EXE_PATH EPFX"TARGET_EXE_PATH"
|
||||
#define ENV_DLL_PATH EPFX"INJECT_DLL_PATH"
|
||||
#define ENV_PROC_CMD EPFX"PROCESS_COMMAND"
|
||||
@ -1,33 +1,5 @@
|
||||
BITS 64
|
||||
|
||||
main: ; Replacement entry point
|
||||
push rbp
|
||||
mov rbp, rsp
|
||||
sub rsp, 10h + 90h
|
||||
|
||||
|
||||
call GetKernel32ModuleHandle
|
||||
mov [rbp - 8h], rax ; kernel32.dll
|
||||
|
||||
mov rcx, rax
|
||||
call GetAddressOf_GetProcAddress
|
||||
mov [rbp - 10h], rax ; *GetProcAddress
|
||||
|
||||
|
||||
mov rcx, [rbp - 8h] ; kernel32.dll
|
||||
lea rdx, [rel s_LoadLibraryA]
|
||||
mov rax, [rbp - 10h] ; *GetProcAddress
|
||||
call rax ; rax = *LoadLibraryA
|
||||
|
||||
lea rcx, [rel dllPath]
|
||||
call rax ; LoadLibraryA(dllPath)
|
||||
|
||||
|
||||
add rsp, 10h + 90h
|
||||
pop rbp
|
||||
ret
|
||||
|
||||
|
||||
; https://dennisbabkin.com/blog/?t=how-to-implement-getprocaddress-in-shellcode
|
||||
GetKernel32ModuleHandle:
|
||||
mov rax, gs:[60h]
|
||||
@ -54,15 +26,15 @@ GetAddressOf_GetProcAddress:
|
||||
mov r10, 41636f7250746547h ; "GetProcA"
|
||||
mov r11, 0073736572646441h ; "Address\0"
|
||||
|
||||
GAO_GPA@1:
|
||||
.1:
|
||||
mov r9d, [r8]
|
||||
lea r9, [rcx + r9]
|
||||
|
||||
; Function name comparision
|
||||
cmp r10, [r9]
|
||||
jnz GAO_GPA@2
|
||||
jnz .2
|
||||
cmp r11, [r9 + 7]
|
||||
jnz GAO_GPA@2
|
||||
jnz .2
|
||||
|
||||
; Found GetProcAddress
|
||||
neg rdx
|
||||
@ -79,20 +51,12 @@ GAO_GPA@1:
|
||||
mov r10d, [r10 + rdx * 4]
|
||||
|
||||
lea rax, [rcx + r10] ; Function address
|
||||
jmp GAO_GPA@end
|
||||
jmp .end
|
||||
|
||||
GAO_GPA@2:
|
||||
.2:
|
||||
add r8, 4
|
||||
dec rdx
|
||||
jnz GAO_GPA@1
|
||||
jnz .1
|
||||
|
||||
GAO_GPA@end:
|
||||
.end:
|
||||
ret
|
||||
|
||||
|
||||
; Strings
|
||||
s_LoadLibraryA: db "LoadLibraryA", 0
|
||||
|
||||
dllPath:
|
||||
; This will be filled out by the injector
|
||||
; Path to the dll to inject into the launcher
|
||||
5
injector/include/inject.h
Normal file
5
injector/include/inject.h
Normal file
@ -0,0 +1,5 @@
|
||||
#pragma once
|
||||
|
||||
#include <windows.h>
|
||||
|
||||
void inject(HANDLE process, const void *payload, size_t payloadSize, const wchar_t *dllPath);
|
||||
@ -1,18 +0,0 @@
|
||||
# Assemble the payload that will be injected into the game
|
||||
l_payload_bin = asm_gen.process('src/payload.asm')
|
||||
|
||||
# Embed it into the library
|
||||
l_res_files = custom_target(
|
||||
'lpayload.[oh]',
|
||||
output: [ 'lpayload.o', 'lpayload.h' ],
|
||||
input: [ l_payload_bin ],
|
||||
command: [ gen_res, './injector/launcher_payload', '@OUTPUT0@', '@OUTPUT1@', '@INPUT@' ]
|
||||
)
|
||||
|
||||
shared_library(
|
||||
'launcher_payload',
|
||||
'src/dll.c',
|
||||
l_res_files,
|
||||
include_directories: '../include',
|
||||
name_prefix: ''
|
||||
)
|
||||
@ -1,67 +0,0 @@
|
||||
#include <injshared.h>
|
||||
|
||||
#include <lpayload.h>
|
||||
|
||||
const char EXE_ENV[] = "JADEITE_TARGET_EXE_PATH";
|
||||
const char INJECT_DLL_ENV[] = "JADEITE_INJECT_DLL_PATH";
|
||||
|
||||
static inline void read_env(const char *env, char *dest, size_t size) {
|
||||
GetEnvironmentVariableA(env, dest, size);
|
||||
SetEnvironmentVariableA(env, "");
|
||||
}
|
||||
|
||||
BOOL WINAPI DllMain(HINSTANCE inst, DWORD reason, LPVOID reserved) {
|
||||
// Only listen for attach
|
||||
if (reason != DLL_PROCESS_ATTACH) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
// Get target EXE path
|
||||
char targetExe[MAX_PATH];
|
||||
read_env(EXE_ENV, targetExe, sizeof(targetExe));
|
||||
|
||||
// Get the path of the DLL to inject
|
||||
char injectDll[MAX_PATH];
|
||||
read_env(INJECT_DLL_ENV, injectDll, sizeof(injectDll));
|
||||
|
||||
// Compute the working directory path
|
||||
char workdir[MAX_PATH];
|
||||
strcpy(workdir, targetExe);
|
||||
*(strrchr(workdir, '\\')) = '\0';
|
||||
|
||||
// Start the game
|
||||
STARTUPINFO si;
|
||||
ZeroMemory(&si, sizeof(si));
|
||||
|
||||
PROCESS_INFORMATION pi;
|
||||
si.cb = sizeof(si);
|
||||
ZeroMemory(&pi, sizeof(pi));
|
||||
|
||||
if (!CreateProcessA(
|
||||
targetExe,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
FALSE,
|
||||
CREATE_SUSPENDED,
|
||||
NULL,
|
||||
workdir,
|
||||
&si,
|
||||
&pi
|
||||
)) {
|
||||
exit(1);
|
||||
}
|
||||
|
||||
// Inject
|
||||
void *payloadStart = &_binary_lpayload_o_p_payload_bin_start;
|
||||
size_t payloadSize = (size_t)&_binary_lpayload_o_p_payload_bin_size;
|
||||
inject(pi.hProcess, payloadStart, payloadSize, injectDll);
|
||||
|
||||
// Resume the process
|
||||
ResumeThread(pi.hThread);
|
||||
|
||||
// The launcher process should now hang untill the game terminates
|
||||
WaitForSingleObject(pi.hProcess, INFINITE);
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
@ -1,137 +0,0 @@
|
||||
BITS 64
|
||||
|
||||
main: ; Replacement entry point
|
||||
push rbp
|
||||
mov rbp, rsp
|
||||
sub rsp, 30h + 90h
|
||||
|
||||
|
||||
call GetKernel32ModuleHandle
|
||||
mov [rbp - 8h], rax ; kernel32.dll
|
||||
|
||||
mov rcx, rax
|
||||
call GetAddressOf_GetProcAddress
|
||||
mov [rbp - 10h], rax ; *GetProcAddress
|
||||
|
||||
|
||||
mov rcx, [rbp - 8h] ; kernel32.dll
|
||||
lea rdx, [rel s_LoadLibraryA]
|
||||
mov rax, [rbp - 10h] ; *GetProcAddress
|
||||
call rax ; rax = *LoadLibraryA
|
||||
mov [rbp - 18h], rax
|
||||
|
||||
lea rcx, [rel dllPath]
|
||||
call rax ; LoadLibraryA(dllPath)
|
||||
|
||||
|
||||
mov rcx, [rbp - 8h] ; kernel32.dll
|
||||
lea rdx, [rel s_GetModuleHandleA]
|
||||
mov rax, [rbp - 10h] ; *GetProcAddress
|
||||
call rax ; rax = *GetModuleHandle
|
||||
|
||||
mov rcx, 0
|
||||
call rax ; rax = .exe base address
|
||||
mov [rbp - 20h], rax
|
||||
|
||||
mov rcx, [rbp - 8h] ; kernel32.dll
|
||||
lea rdx, [rel s_GetCommandLineW]
|
||||
mov rax, [rbp - 10h] ; *GetProcAddress
|
||||
call rax ; rax = *GetCommandLineW
|
||||
|
||||
call rax ; rax = command line
|
||||
mov [rbp - 28h], rax
|
||||
|
||||
|
||||
lea rcx, [rel s_UnityPlayer.dll]
|
||||
mov rax, [rbp - 18h] ; *LoadLibraryA
|
||||
call rax ; rax = UnityPlayer.dll
|
||||
|
||||
mov rcx, rax
|
||||
lea rdx, [rel s_UnityMain]
|
||||
mov rax, [rbp - 10h] ; *GetProcAddress
|
||||
call rax ; rax = *UnityMain
|
||||
|
||||
mov rcx, [rbp - 20h] ; .exe base address
|
||||
mov rdx, 0 ; hPrevInstance - 0
|
||||
mov r8, [rbp - 28h] ; command line
|
||||
mov r9, 1 ; SW_NORMAL
|
||||
call rax ; UnityMain(...)
|
||||
|
||||
|
||||
add rsp, 30h + 90h
|
||||
pop rbp
|
||||
ret
|
||||
|
||||
|
||||
; https://dennisbabkin.com/blog/?t=how-to-implement-getprocaddress-in-shellcode
|
||||
GetKernel32ModuleHandle:
|
||||
mov rax, gs:[60h]
|
||||
mov rax, [rax + 18h]
|
||||
mov rax, [rax + 20h]
|
||||
mov rax, [rax]
|
||||
mov rax, [rax]
|
||||
mov rax, [rax + 20h]
|
||||
ret
|
||||
|
||||
|
||||
GetAddressOf_GetProcAddress:
|
||||
mov eax, [rcx + 3ch]
|
||||
add rax, rcx
|
||||
lea rax, [rax + 88h]
|
||||
|
||||
mov edx, [rax]
|
||||
lea rax, [rcx + rdx]
|
||||
|
||||
mov edx, [rax + 18h]
|
||||
mov r8d, [rax + 20h]
|
||||
lea r8, [rcx + r8]
|
||||
|
||||
mov r10, 41636f7250746547h ; "GetProcA"
|
||||
mov r11, 0073736572646441h ; "Address\0"
|
||||
|
||||
GAO_GPA@1:
|
||||
mov r9d, [r8]
|
||||
lea r9, [rcx + r9]
|
||||
|
||||
; Function name comparision
|
||||
cmp r10, [r9]
|
||||
jnz GAO_GPA@2
|
||||
cmp r11, [r9 + 7]
|
||||
jnz GAO_GPA@2
|
||||
|
||||
; Found GetProcAddress
|
||||
neg rdx
|
||||
mov r10d, [rax + 18h]
|
||||
lea rdx, [r10 + rdx]
|
||||
|
||||
mov r10d, [rax + 24h]
|
||||
lea r10, [rcx + r10]
|
||||
movzx rdx, word [r10 + rdx * 2]
|
||||
|
||||
mov r10d, [rax + 1ch]
|
||||
lea r10, [rcx + r10]
|
||||
|
||||
mov r10d, [r10 + rdx * 4]
|
||||
|
||||
lea rax, [rcx + r10] ; Function address
|
||||
jmp GAO_GPA@end
|
||||
|
||||
GAO_GPA@2:
|
||||
add r8, 4
|
||||
dec rdx
|
||||
jnz GAO_GPA@1
|
||||
|
||||
GAO_GPA@end:
|
||||
ret
|
||||
|
||||
|
||||
; Strings
|
||||
s_LoadLibraryA: db "LoadLibraryA", 0
|
||||
s_GetModuleHandleA: db "GetModuleHandleA", 0
|
||||
s_GetCommandLineW: db "GetCommandLineW", 0
|
||||
s_UnityPlayer.dll: db "UnityPlayer.dll", 0
|
||||
s_UnityMain: db "UnityMain", 0
|
||||
|
||||
dllPath:
|
||||
; This will be filled out by the launcher payload dll
|
||||
; Path to the dll to inject into the game
|
||||
@ -1,21 +1,50 @@
|
||||
# Assemble the payload that will be injected into the launcher
|
||||
inj_payload_bin = asm_gen.process('src/payload.asm')
|
||||
include_dir = include_directories('include')
|
||||
str_include_dir = join_paths(meson.current_source_dir(), 'include')
|
||||
|
||||
# Embed it into the library
|
||||
inj_res_files = custom_target(
|
||||
'ipayload.[oh]',
|
||||
output: [ 'ipayload.o', 'ipayload.h' ],
|
||||
input: [ inj_payload_bin ],
|
||||
command: [ gen_res, './injector', '@OUTPUT0@', '@OUTPUT1@', '@INPUT@' ]
|
||||
# Assemble the payloads
|
||||
launcher_payload_bin = asm_gen.process(
|
||||
'src/launcher_p.asm',
|
||||
extra_args: [ '-i', str_include_dir ]
|
||||
)
|
||||
|
||||
game_payload_bin = asm_gen.process(
|
||||
'src/game_p.asm',
|
||||
extra_args: [ '-i', str_include_dir ]
|
||||
)
|
||||
|
||||
# Embed them into .o files
|
||||
exe_res_files = custom_target(
|
||||
'launcher_p.[oh]',
|
||||
output: [ 'launcher_p.o', 'launcher_p.h' ],
|
||||
input: [ launcher_payload_bin ],
|
||||
command: [ gen_res, '--header', '--object', './injector', '@OUTPUT0@', '@OUTPUT1@', '@INPUT@' ]
|
||||
)
|
||||
|
||||
dll_res_files = custom_target(
|
||||
'game_p.[oh]',
|
||||
output: [ 'game_p.o', 'game_p.h' ],
|
||||
input: [ game_payload_bin ],
|
||||
command: [ gen_res, '--header', '--object', './injector', '@OUTPUT0@', '@OUTPUT1@', '@INPUT@' ]
|
||||
)
|
||||
|
||||
# Main injector exe
|
||||
executable(
|
||||
'jadeite',
|
||||
'src/injector.c',
|
||||
inj_res_files,
|
||||
include_directories: 'include',
|
||||
name_prefix: ''
|
||||
'src/exe.c',
|
||||
'src/inject.c',
|
||||
exe_res_files,
|
||||
include_directories: include_dir,
|
||||
name_prefix: '',
|
||||
link_args: '-municode'
|
||||
)
|
||||
|
||||
subdir('launcher_payload')
|
||||
# Dll that will be injected into the launcher
|
||||
shared_library(
|
||||
'launcher_payload',
|
||||
'src/dll.c',
|
||||
'src/inject.c',
|
||||
dll_res_files,
|
||||
include_directories: include_dir,
|
||||
name_prefix: '',
|
||||
link_args: '-municode'
|
||||
)
|
||||
|
||||
121
injector/src/dll.c
Normal file
121
injector/src/dll.c
Normal file
@ -0,0 +1,121 @@
|
||||
#include <stdio.h>
|
||||
|
||||
#include <inject.h>
|
||||
#include <envs.h>
|
||||
|
||||
#include <game_p.h>
|
||||
|
||||
typedef char *(*wgufn_t)(wchar_t* path); // wine_get_unix_file_name
|
||||
|
||||
const wchar_t *J_MB_TITLE = L"Jadeite Launcher Payload";
|
||||
|
||||
BOOL WINAPI DllMain(HINSTANCE inst, DWORD reason, LPVOID reserved) {
|
||||
// Only listen for attach
|
||||
if (reason != DLL_PROCESS_ATTACH) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
// Get target EXE path
|
||||
wchar_t targetExe[MAX_PATH];
|
||||
GetEnvironmentVariableW(ENV_EXE_PATH, targetExe, MAX_PATH);
|
||||
|
||||
// Get the path of the DLL to inject
|
||||
wchar_t injectDll[MAX_PATH];
|
||||
GetEnvironmentVariableW(ENV_DLL_PATH, injectDll, MAX_PATH);
|
||||
|
||||
// Get game commandline
|
||||
wchar_t cmdline[8192];
|
||||
GetEnvironmentVariableW(ENV_PROC_CMD, cmdline, sizeof(cmdline) / sizeof(wchar_t));
|
||||
|
||||
// Compute the working directory path
|
||||
wchar_t workdir[MAX_PATH];
|
||||
wcscpy(workdir, targetExe);
|
||||
*(wcsrchr(workdir, L'\\')) = L'\0';
|
||||
|
||||
// SAFETY: verify that the injector is not inside the game directory
|
||||
HMODULE kernel32 = GetModuleHandleA("kernel32.dll");
|
||||
wgufn_t wine_get_unix_file_name = (wgufn_t)GetProcAddress(kernel32, "wine_get_unix_file_name");
|
||||
|
||||
if (wine_get_unix_file_name) {
|
||||
char *unixInjectDll = wine_get_unix_file_name(injectDll);
|
||||
char *unixWorkdir = wine_get_unix_file_name(workdir);
|
||||
|
||||
char *i = unixInjectDll, *w = unixWorkdir;
|
||||
char startsWith = 0;
|
||||
while (*i && *w) {
|
||||
startsWith = *i == *w;
|
||||
if (!startsWith) break;
|
||||
|
||||
i++, w++;
|
||||
}
|
||||
|
||||
HANDLE heap = GetProcessHeap();
|
||||
HeapFree(heap, 0, unixInjectDll);
|
||||
HeapFree(heap, 0, unixWorkdir);
|
||||
|
||||
if (startsWith) {
|
||||
MessageBoxW(NULL, L"Putting the patcher (or any other foreign PE binaries) inside the game directory is dangerous! Please move it elsewhere.", J_MB_TITLE, MB_OK | MB_ICONERROR);
|
||||
exit(1);
|
||||
}
|
||||
} else {
|
||||
MessageBoxW(NULL, L"Could not find wine_get_unix_file_name! Wine version too old?", J_MB_TITLE, MB_OK | MB_ICONWARNING);
|
||||
}
|
||||
|
||||
// Get restart flag file path
|
||||
wchar_t restartFlagFile[MAX_PATH];
|
||||
GetTempPathW(MAX_PATH, restartFlagFile);
|
||||
wcscat(restartFlagFile, L"jadeite\\restart_flag");
|
||||
|
||||
do {
|
||||
// Start the game
|
||||
STARTUPINFOW si;
|
||||
ZeroMemory(&si, sizeof(si));
|
||||
si.cb = sizeof(si);
|
||||
|
||||
PROCESS_INFORMATION pi;
|
||||
ZeroMemory(&pi, sizeof(pi));
|
||||
|
||||
if (!CreateProcessW(
|
||||
NULL,
|
||||
cmdline,
|
||||
NULL,
|
||||
NULL,
|
||||
FALSE,
|
||||
CREATE_SUSPENDED,
|
||||
NULL,
|
||||
workdir,
|
||||
&si,
|
||||
&pi
|
||||
)) {
|
||||
wchar_t message[1024];
|
||||
wsprintfW(message, L"Failed to start game process: %ld\nGame executable path: '%ls'", GetLastError(), targetExe);
|
||||
MessageBoxW(NULL, message, J_MB_TITLE, MB_OK | MB_ICONERROR);
|
||||
|
||||
exit(1);
|
||||
}
|
||||
|
||||
// Inject
|
||||
void *payloadStart = &_binary_game_p_o_p_game_p_bin_start;
|
||||
size_t payloadSize = (size_t)&_binary_game_p_o_p_game_p_bin_size;
|
||||
inject(pi.hProcess, payloadStart, payloadSize, injectDll);
|
||||
|
||||
// Remove the restart flag file
|
||||
DeleteFileW(restartFlagFile);
|
||||
|
||||
// Optional: wait for user input before resuming (useful for debugging)
|
||||
char *waitEnabled = getenv("WAIT_BEFORE_RESUME");
|
||||
if (waitEnabled && *waitEnabled) {
|
||||
wchar_t message[64];
|
||||
wsprintfW(message, L"PID: %ld. Press OK to continue", pi.dwProcessId);
|
||||
MessageBoxW(NULL, message, J_MB_TITLE, MB_OK | MB_ICONINFORMATION);
|
||||
}
|
||||
|
||||
// Resume the process
|
||||
ResumeThread(pi.hThread);
|
||||
|
||||
// The launcher process should now hang untill the game terminates
|
||||
WaitForSingleObject(pi.hProcess, INFINITE);
|
||||
} while (GetFileAttributesW(restartFlagFile) != INVALID_FILE_ATTRIBUTES);
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
120
injector/src/exe.c
Normal file
120
injector/src/exe.c
Normal file
@ -0,0 +1,120 @@
|
||||
#include <stdio.h>
|
||||
|
||||
#include <inject.h>
|
||||
#include <envs.h>
|
||||
|
||||
#include <launcher_p.h>
|
||||
|
||||
const wchar_t *LAUNCHER_INJECT_DLL = L"launcher_payload.dll";
|
||||
const wchar_t *GAME_INJECT_DLL = L"game_payload.dll";
|
||||
|
||||
#define SHIFT(argc, argv) argc--, argv++
|
||||
|
||||
int wmain(int argc, wchar_t **argv) {
|
||||
// Read arguments
|
||||
wchar_t *gamePath = NULL;
|
||||
wchar_t *launcherPath = NULL;
|
||||
|
||||
// Skip executable
|
||||
SHIFT(argc, argv);
|
||||
|
||||
switch (argc) {
|
||||
case 0:
|
||||
wprintf(L"Usage: wine jadeite.exe [game path] <launcher path>\n");
|
||||
return 0;
|
||||
case 1:
|
||||
gamePath = argv[0];
|
||||
SHIFT(argc, argv);
|
||||
|
||||
launcherPath = L"--";
|
||||
|
||||
break;
|
||||
default:
|
||||
gamePath = argv[0];
|
||||
SHIFT(argc, argv);
|
||||
|
||||
launcherPath = argv[0];
|
||||
SHIFT(argc, argv);
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
// Default launcher path
|
||||
if (wcscmp(launcherPath, L"--") == 0) {
|
||||
wprintf(L"No launcher process specified! Using explorer.exe\n");
|
||||
launcherPath = L"C:\\Windows\\explorer.exe";
|
||||
}
|
||||
|
||||
// cd into the injector directory
|
||||
wchar_t injectorPath[MAX_PATH];
|
||||
GetModuleFileNameW(GetModuleHandleW(NULL), injectorPath, MAX_PATH);
|
||||
|
||||
*(wcsrchr(injectorPath, L'\\')) = L'\0';
|
||||
|
||||
SetCurrentDirectoryW(injectorPath);
|
||||
|
||||
// Compute absolute paths
|
||||
wchar_t gameExePath[MAX_PATH];
|
||||
GetFullPathNameW(gamePath, MAX_PATH, gameExePath, NULL);
|
||||
|
||||
wchar_t gamePayloadPath[MAX_PATH];
|
||||
GetFullPathNameW(GAME_INJECT_DLL, MAX_PATH, gamePayloadPath, NULL);
|
||||
|
||||
wchar_t launcherPayloadPath[MAX_PATH];
|
||||
GetFullPathNameW(LAUNCHER_INJECT_DLL, MAX_PATH, launcherPayloadPath, NULL);
|
||||
|
||||
// Construct commandline for the game process
|
||||
wchar_t cmdline[8192];
|
||||
wsprintfW(cmdline, L"\"%ls\"", gameExePath);
|
||||
|
||||
while (argc) {
|
||||
wchar_t arg[8192];
|
||||
wsprintfW(arg, L" \"%ls\"", argv[0]);
|
||||
wcscat(cmdline, arg);
|
||||
|
||||
SHIFT(argc, argv);
|
||||
}
|
||||
|
||||
// Set envvars
|
||||
SetEnvironmentVariableW(ENV_EXE_PATH, gameExePath);
|
||||
SetEnvironmentVariableW(ENV_DLL_PATH, gamePayloadPath);
|
||||
SetEnvironmentVariableW(ENV_PROC_CMD, cmdline);
|
||||
|
||||
// Start the launcher
|
||||
wprintf(L"Starting '%ls' via '%ls'\n", gameExePath, launcherPath);
|
||||
|
||||
STARTUPINFOW si;
|
||||
ZeroMemory(&si, sizeof(si));
|
||||
si.cb = sizeof(si);
|
||||
|
||||
PROCESS_INFORMATION pi;
|
||||
ZeroMemory(&pi, sizeof(pi));
|
||||
|
||||
if (!CreateProcessW(
|
||||
launcherPath,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
FALSE,
|
||||
CREATE_SUSPENDED,
|
||||
NULL,
|
||||
NULL,
|
||||
&si,
|
||||
&pi
|
||||
)) {
|
||||
fwprintf(stderr, L"Could not start process! (%ld)\n", GetLastError());
|
||||
exit(1);
|
||||
}
|
||||
|
||||
wprintf(L"Started launcher process (%ld)\n", pi.dwProcessId);
|
||||
|
||||
// Inject
|
||||
void *payloadStart = &_binary_launcher_p_o_p_launcher_p_bin_start;
|
||||
size_t payloadSize = (size_t)&_binary_launcher_p_o_p_launcher_p_bin_size; // yes this is valid
|
||||
inject(pi.hProcess, payloadStart, payloadSize, launcherPayloadPath);
|
||||
|
||||
// Resume the process
|
||||
ResumeThread(pi.hThread);
|
||||
|
||||
return 0;
|
||||
}
|
||||
186
injector/src/game_p.asm
Normal file
186
injector/src/game_p.asm
Normal file
@ -0,0 +1,186 @@
|
||||
BITS 64
|
||||
|
||||
; Macro definitions
|
||||
|
||||
; read dst, pSrc, size
|
||||
%macro read 3
|
||||
|
||||
mov %1, [%2]
|
||||
add %2, %3
|
||||
|
||||
%endmacro
|
||||
|
||||
; copy pDst, pSrc, temp, tempSize
|
||||
%macro copy 4
|
||||
|
||||
mov %3, [%2]
|
||||
mov [%1], %3
|
||||
add %1, %4
|
||||
add %2, %4
|
||||
|
||||
%endmacro
|
||||
|
||||
; unprotect addr, size, fn
|
||||
%macro unprotect 3
|
||||
|
||||
mov rcx, %1
|
||||
mov rdx, %2
|
||||
mov r8, 40h ; PAGE_EXECUTE_READWRITE
|
||||
lea r9, [rel oldProtect]
|
||||
|
||||
call %3
|
||||
|
||||
%endmacro
|
||||
|
||||
; reprotect addr, size, fn
|
||||
%macro reprotect 3
|
||||
|
||||
mov rcx, %1
|
||||
mov rdx, %2
|
||||
lea r9, [rel oldProtect]
|
||||
mov r8d, [r9]
|
||||
|
||||
call %3
|
||||
|
||||
%endmacro
|
||||
|
||||
|
||||
main: ; Replacement entry point
|
||||
push rsi
|
||||
push rdi
|
||||
push r12
|
||||
push r13
|
||||
push r14
|
||||
|
||||
|
||||
call GetKernel32ModuleHandle
|
||||
mov rsi, rax ; kernel32.dll
|
||||
|
||||
mov rcx, rax
|
||||
call GetAddressOf_GetProcAddress
|
||||
mov rdi, rax ; *GetProcAddress
|
||||
|
||||
|
||||
mov rcx, rsi ; kernel32.dll
|
||||
lea rdx, [rel s_VirtualProtect]
|
||||
call rdi ; rax = *VirtualProtect
|
||||
|
||||
mov rcx, rax
|
||||
call RecoverExecutable
|
||||
|
||||
|
||||
mov rcx, rsi ; kernel32.dll
|
||||
lea rdx, [rel s_LoadLibraryW]
|
||||
call rdi ; rax = *LoadLibraryW
|
||||
|
||||
lea rcx, [rel dllPath]
|
||||
call rax ; LoadLibraryW(dllPath)
|
||||
|
||||
|
||||
mov rcx, rsi ; kernel32.dll
|
||||
lea rdx, [rel s_GetModuleHandleA]
|
||||
call rdi ; rax = *GetModuleHandle
|
||||
mov r12, rax
|
||||
|
||||
mov rcx, 0
|
||||
call rax ; rax = .exe base address
|
||||
mov r13, rax
|
||||
|
||||
mov rcx, rsi ; kernel32.dll
|
||||
lea rdx, [rel s_GetCommandLineW]
|
||||
call rdi ; rax = *GetCommandLineW
|
||||
|
||||
call rax ; rax = command line
|
||||
mov r14, rax
|
||||
|
||||
|
||||
lea rcx, [rel s_UnityPlayer.dll]
|
||||
call r12 ; rax = UnityPlayer.dll
|
||||
|
||||
mov rcx, rax
|
||||
lea rdx, [rel s_UnityMain]
|
||||
call rdi ; rax = *UnityMain
|
||||
|
||||
mov rcx, r13 ; .exe base address
|
||||
mov rdx, 0 ; hPrevInstance - 0
|
||||
mov r8, r14 ; command line
|
||||
mov r9, 1 ; SW_NORMAL
|
||||
call rax ; UnityMain(...)
|
||||
|
||||
|
||||
pop r14
|
||||
pop r13
|
||||
pop r12
|
||||
pop rdi
|
||||
pop rsi
|
||||
ret
|
||||
|
||||
|
||||
RecoverExecutable: ; expects *VirtualProtect in rcx
|
||||
push rbx
|
||||
push r12
|
||||
push r13
|
||||
push r14
|
||||
sub rsp, 8
|
||||
|
||||
mov r13, rcx
|
||||
|
||||
; Find the recovery data structure
|
||||
lea rbx, [rel dllPath]
|
||||
|
||||
.search:
|
||||
read ax, rbx, 2
|
||||
test ax, ax
|
||||
jnz .search
|
||||
|
||||
; Recover entry point bytes (6 + 8 = 14 total)
|
||||
read r12, rbx, 8 ; Address
|
||||
mov r14, r12
|
||||
|
||||
unprotect r14, 14, r13
|
||||
copy r12, rbx, rax, 8
|
||||
copy r12, rbx, eax, 4
|
||||
copy r12, rbx, ax, 2
|
||||
reprotect r14, 14, r13
|
||||
|
||||
; Recover import descriptor bytes (20 total)
|
||||
read r12, rbx, 8
|
||||
mov r14, r12
|
||||
|
||||
unprotect r14, 20, r13
|
||||
copy r12, rbx, rax, 8
|
||||
copy r12, rbx, rax, 8
|
||||
copy r12, rbx, eax, 4
|
||||
reprotect r14, 20, r13
|
||||
|
||||
; Recover import data directory entry size bytes (4 total)
|
||||
read r12, rbx, 8
|
||||
mov r14, r12
|
||||
|
||||
unprotect r14, 4, r13
|
||||
copy r12, rbx, eax, 4
|
||||
reprotect r14, 4, r13
|
||||
|
||||
add rsp, 8
|
||||
pop r14
|
||||
pop r13
|
||||
pop r12
|
||||
pop rbx
|
||||
ret
|
||||
|
||||
|
||||
%include "gpa.asm"
|
||||
|
||||
oldProtect: dd 0
|
||||
|
||||
; Strings
|
||||
s_VirtualProtect: db "VirtualProtect", 0
|
||||
s_LoadLibraryW: db "LoadLibraryW", 0
|
||||
s_GetModuleHandleA: db "GetModuleHandleA", 0
|
||||
s_GetCommandLineW: db "GetCommandLineW", 0
|
||||
s_UnityPlayer.dll: db "UnityPlayer.dll", 0
|
||||
s_UnityMain: db "UnityMain", 0
|
||||
|
||||
dllPath:
|
||||
; This will be filled out by the launcher payload dll
|
||||
; Path to the dll to inject into the game
|
||||
@ -1,4 +1,21 @@
|
||||
#include <windows.h>
|
||||
#include <inject.h>
|
||||
|
||||
#define JUMP_SIZE (6 + sizeof(void*))
|
||||
|
||||
// Original values to recover after the injection
|
||||
// Recovery is performed by the assembly payload
|
||||
#pragma pack(push, 1)
|
||||
struct recovery_data {
|
||||
void *entryPointAddress;
|
||||
char entryPointData[JUMP_SIZE];
|
||||
|
||||
void *importDescriptorAddress;
|
||||
IMAGE_IMPORT_DESCRIPTOR importDescriptorData;
|
||||
|
||||
void *sizeFieldAddress;
|
||||
DWORD sizeFieldData;
|
||||
};
|
||||
#pragma pack(pop)
|
||||
|
||||
static inline void write_protected_process_memory(HANDLE process, void *address, const void *buf, size_t size) {
|
||||
DWORD oldProtect;
|
||||
@ -10,20 +27,13 @@ static inline void write_protected_process_memory(HANDLE process, void *address,
|
||||
VirtualProtectEx(process, address, size, oldProtect, &oldProtect);
|
||||
}
|
||||
|
||||
static inline void inject(HANDLE process, const void *payload, size_t payloadSize, const char *dllPath) {
|
||||
size_t _;
|
||||
|
||||
// Inject the loader into the module
|
||||
size_t dllPathLen = strlen(dllPath) + 1;
|
||||
|
||||
char *remoteAlloc = VirtualAllocEx(process, NULL, payloadSize + dllPathLen, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
||||
WriteProcessMemory(process, remoteAlloc, payload, payloadSize, &_);
|
||||
WriteProcessMemory(process, remoteAlloc + payloadSize, dllPath, dllPathLen, &_);
|
||||
void inject(HANDLE process, const void *payload, size_t payloadSize, const wchar_t *dllPath) {
|
||||
size_t _; // Contrary to the docs, {Write,Read}ProcessMemory likes to crash if the last arg is NULL
|
||||
|
||||
// Find the EXE header in the process
|
||||
char exeHeader[1024];
|
||||
IMAGE_DOS_HEADER *dosHeader;
|
||||
IMAGE_NT_HEADERS64 *ntHeaders;
|
||||
IMAGE_DOS_HEADER *dosHeader = NULL;
|
||||
IMAGE_NT_HEADERS64 *ntHeaders = NULL;
|
||||
|
||||
MEMORY_BASIC_INFORMATION memoryInfo;
|
||||
char *currentAddress = 0x0;
|
||||
@ -45,7 +55,7 @@ static inline void inject(HANDLE process, const void *payload, size_t payloadSiz
|
||||
}
|
||||
|
||||
// Skip DLLs
|
||||
if ((ntHeaders->FileHeader.Characteristics | IMAGE_FILE_DLL) == IMAGE_FILE_DLL) {
|
||||
if ((ntHeaders->FileHeader.Characteristics & IMAGE_FILE_DLL) == IMAGE_FILE_DLL) {
|
||||
goto cont;
|
||||
}
|
||||
|
||||
@ -64,24 +74,60 @@ static inline void inject(HANDLE process, const void *payload, size_t payloadSiz
|
||||
|
||||
char *exe = (char*)memoryInfo.BaseAddress;
|
||||
|
||||
|
||||
// Inject the loader into the process
|
||||
const unsigned char JUMP_INST[] = { 0xFF, 0x25, 0x00, 0x00, 0x00, 0x00 };
|
||||
|
||||
size_t dllPathSize = (wcslen(dllPath) + 1) * sizeof(wchar_t);
|
||||
|
||||
size_t allocSize = payloadSize + dllPathSize + sizeof(struct recovery_data);
|
||||
char *remoteAlloc = VirtualAllocEx(process, NULL, allocSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
|
||||
|
||||
// Write the assembly payload and dll path
|
||||
WriteProcessMemory(process, remoteAlloc, payload, payloadSize, &_);
|
||||
WriteProcessMemory(process, remoteAlloc + payloadSize, dllPath, dllPathSize, &_);
|
||||
|
||||
|
||||
// Modify the executable to run the assembly payload
|
||||
// Recovery data structure
|
||||
struct recovery_data rd;
|
||||
|
||||
// Replace the entry point with a jump to the loader
|
||||
char *entryPoint = exe + ntHeaders->OptionalHeader.AddressOfEntryPoint;
|
||||
|
||||
const unsigned char JUMP_INST[] = { 0xFF, 0x25, 0x00, 0x00, 0x00, 0x00 };
|
||||
// Save the original entry point address and bytes
|
||||
rd.entryPointAddress = entryPoint;
|
||||
ReadProcessMemory(process, rd.entryPointAddress, rd.entryPointData, sizeof(rd.entryPointData), &_);
|
||||
|
||||
// Replace the entry point with a jump to the assembly payload
|
||||
write_protected_process_memory(process, entryPoint, JUMP_INST, sizeof(JUMP_INST));
|
||||
write_protected_process_memory(process, entryPoint + sizeof(JUMP_INST), &remoteAlloc, sizeof(remoteAlloc));
|
||||
|
||||
|
||||
// Break the import table to prevent any dlls from being loaded
|
||||
// Step 1: break the first import descriptor
|
||||
char *importDescriptors = exe + ntHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].VirtualAddress;
|
||||
|
||||
// Save the original descriptor address and bytes
|
||||
rd.importDescriptorAddress = importDescriptors;
|
||||
ReadProcessMemory(process, rd.importDescriptorAddress, &rd.importDescriptorData, sizeof(rd.importDescriptorData), &_);
|
||||
|
||||
// Overwrite with zeroes
|
||||
IMAGE_IMPORT_DESCRIPTOR firstDescriptor;
|
||||
ZeroMemory(&firstDescriptor, sizeof(firstDescriptor));
|
||||
|
||||
write_protected_process_memory(process, importDescriptors, &firstDescriptor, sizeof(firstDescriptor));
|
||||
|
||||
// Step 2: break the image data directory entry
|
||||
ntHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].Size = 0;
|
||||
char* ddAddr = ((char*)&(ntHeaders->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT].Size)) - exeHeader + exe;
|
||||
|
||||
write_protected_process_memory(process, exe, exeHeader, sizeof(exeHeader));
|
||||
// Save the original value
|
||||
rd.sizeFieldAddress = ddAddr;
|
||||
ReadProcessMemory(process, rd.sizeFieldAddress, &rd.sizeFieldData, sizeof(rd.sizeFieldData), &_);
|
||||
|
||||
// Set to 0
|
||||
DWORD newSize = 0;
|
||||
write_protected_process_memory(process, ddAddr, &newSize, sizeof(newSize));
|
||||
|
||||
// Write recovery data to the allocation
|
||||
WriteProcessMemory(process, remoteAlloc + payloadSize + dllPathSize, &rd, sizeof(rd), &_);
|
||||
}
|
||||
@ -1,87 +0,0 @@
|
||||
#include <stdio.h>
|
||||
|
||||
#include <injshared.h>
|
||||
|
||||
#include <ipayload.h>
|
||||
|
||||
const char EXE_ENV[] = "JADEITE_TARGET_EXE_PATH";
|
||||
const char INJECT_DLL_ENV[] = "JADEITE_INJECT_DLL_PATH";
|
||||
|
||||
const char LAUNCHER_INJECT_DLL[] = "launcher_payload.dll";
|
||||
const char GAME_INJECT_DLL[] = "game_payload.dll";
|
||||
|
||||
int main(int argc, char **argv) {
|
||||
// Read arguments
|
||||
char *gamePath = NULL;
|
||||
char *launcherPath = NULL;
|
||||
|
||||
switch (argc) {
|
||||
case 1:
|
||||
printf("Usage: wine jadeite.exe [game path] <launcher path>\n");
|
||||
return 0;
|
||||
case 2:
|
||||
printf("No launcher process specified! Using explorer.exe\n");
|
||||
gamePath = argv[1];
|
||||
launcherPath = "C:\\Windows\\explorer.exe";
|
||||
break;
|
||||
case 3:
|
||||
gamePath = argv[1];
|
||||
launcherPath = argv[2];
|
||||
break;
|
||||
default:
|
||||
fprintf(stderr, "Too many arguments! (%d)\n", argc);
|
||||
return 1;
|
||||
}
|
||||
|
||||
// Compute absolute paths
|
||||
char gameExePath[MAX_PATH];
|
||||
GetFullPathNameA(gamePath, sizeof(gameExePath), gameExePath, NULL);
|
||||
|
||||
char gamePayloadPath[MAX_PATH];
|
||||
GetFullPathNameA(GAME_INJECT_DLL, sizeof(gamePayloadPath), gamePayloadPath, NULL);
|
||||
|
||||
char launcherPayloadPath[MAX_PATH];
|
||||
GetFullPathNameA(LAUNCHER_INJECT_DLL, sizeof(launcherPayloadPath), launcherPayloadPath, NULL);
|
||||
|
||||
printf("Starting \"%s\" via \"%s\"\n", gameExePath, launcherPath);
|
||||
|
||||
// Set envvars
|
||||
SetEnvironmentVariableA(EXE_ENV, gameExePath);
|
||||
SetEnvironmentVariableA(INJECT_DLL_ENV, gamePayloadPath);
|
||||
|
||||
// Start the launcher
|
||||
STARTUPINFO si;
|
||||
ZeroMemory(&si, sizeof(si));
|
||||
|
||||
PROCESS_INFORMATION pi;
|
||||
si.cb = sizeof(si);
|
||||
ZeroMemory(&pi, sizeof(pi));
|
||||
|
||||
if (!CreateProcessA(
|
||||
launcherPath,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
FALSE,
|
||||
CREATE_SUSPENDED,
|
||||
NULL,
|
||||
NULL,
|
||||
&si,
|
||||
&pi
|
||||
)) {
|
||||
fprintf(stderr, "Could not start process! (%ld)\n", GetLastError());
|
||||
exit(1);
|
||||
}
|
||||
|
||||
printf("Started launcher process (%ld)\n", pi.dwProcessId);
|
||||
|
||||
// Inject
|
||||
void *payloadStart = &_binary_ipayload_o_p_payload_bin_start;
|
||||
size_t payloadSize = (size_t)&_binary_ipayload_o_p_payload_bin_size; // yes this is valid
|
||||
inject(pi.hProcess, payloadStart, payloadSize, launcherPayloadPath);
|
||||
|
||||
// Resume the process
|
||||
ResumeThread(pi.hThread);
|
||||
|
||||
return 0;
|
||||
}
|
||||
34
injector/src/launcher_p.asm
Normal file
34
injector/src/launcher_p.asm
Normal file
@ -0,0 +1,34 @@
|
||||
BITS 64
|
||||
|
||||
main: ; Replacement entry point
|
||||
push rsi
|
||||
|
||||
|
||||
call GetKernel32ModuleHandle
|
||||
mov rsi, rax ; kernel32.dll
|
||||
|
||||
mov rcx, rax
|
||||
call GetAddressOf_GetProcAddress
|
||||
|
||||
|
||||
mov rcx, rsi ; kernel32.dll
|
||||
lea rdx, [rel s_LoadLibraryW]
|
||||
call rax ; rax = *LoadLibraryW
|
||||
|
||||
lea rcx, [rel dllPath]
|
||||
call rax ; LoadLibraryA(dllPath)
|
||||
|
||||
|
||||
pop rsi
|
||||
ret
|
||||
|
||||
|
||||
%include "gpa.asm"
|
||||
|
||||
|
||||
; Strings
|
||||
s_LoadLibraryW: db "LoadLibraryW", 0
|
||||
|
||||
dllPath:
|
||||
; This will be filled out by the injector
|
||||
; Path to the dll to inject into the launcher
|
||||
@ -1,4 +1,4 @@
|
||||
project('jadeite', 'c', version: '1.0.0')
|
||||
project('jadeite', 'c', version: '3.0.12')
|
||||
|
||||
nasm = find_program('nasm')
|
||||
gen_res = find_program('gen_resources.sh')
|
||||
@ -8,6 +8,7 @@ asm_gen = generator(
|
||||
nasm,
|
||||
output: '@BASENAME@.bin',
|
||||
arguments: [
|
||||
'@EXTRA_ARGS@',
|
||||
'-f', 'bin',
|
||||
'@INPUT@',
|
||||
'-o', '@OUTPUT@'
|
||||
|
||||
43
metadata.json
Normal file
43
metadata.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"jadeite": {
|
||||
"version": "3.0.12"
|
||||
},
|
||||
"games": {
|
||||
"hi3rd": {
|
||||
"global": {
|
||||
"status": "verified",
|
||||
"version": "7.1.0"
|
||||
},
|
||||
"sea": {
|
||||
"status": "verified",
|
||||
"version": "7.1.0"
|
||||
},
|
||||
"china": {
|
||||
"status": "verified",
|
||||
"version": "7.2.0"
|
||||
},
|
||||
"taiwan": {
|
||||
"status": "verified",
|
||||
"version": "7.1.0"
|
||||
},
|
||||
"korea": {
|
||||
"status": "verified",
|
||||
"version": "7.1.0"
|
||||
},
|
||||
"japan": {
|
||||
"status": "verified",
|
||||
"version": "7.1.0"
|
||||
}
|
||||
},
|
||||
"hsr": {
|
||||
"global": {
|
||||
"status": "unverified",
|
||||
"version": "1.6.0"
|
||||
},
|
||||
"china": {
|
||||
"status": "unverified",
|
||||
"version": "1.6.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user