Add memory scan based on detected module

This commit is contained in:
2025-10-20 09:41:42 +02:00
parent def5f5e9ab
commit 33914c53b4

View File

@@ -77,9 +77,10 @@ void Memory::RestoreBytes(void *address)
}
}
bool Memory::WaitForModule(const std::string& module_name, int timeoutMs = 15000, int intervalMs = 500)
MODULEINFO Memory::WaitForModule(const std::string& module_name, int timeoutMs, int intervalMs)
{
const HANDLE hProc = GetCurrentProcess();
MODULEINFO modInfo{};
for (int waited = 0; waited < timeoutMs; waited += intervalMs)
{
@@ -91,11 +92,10 @@ bool Memory::WaitForModule(const std::string& module_name, int timeoutMs = 15000
for (unsigned int i = 0; i < (cbNeeded / sizeof(HMODULE)); ++i)
{
char modName[MAX_PATH];
if (GetModuleBaseNameA(hProc, hMods[i], modName, sizeof(modName)))
{
if (_stricmp(modName, module_name.c_str()) == 0)
{
return true;
if (GetModuleBaseNameA(hProc, hMods[i], modName, sizeof(modName))) {
if (_stricmp(modName, module_name.c_str()) == 0) {
if (GetModuleInformation(hProc, hMods[i], &modInfo, sizeof(modInfo)))
return modInfo;
}
}
}
@@ -105,7 +105,7 @@ bool Memory::WaitForModule(const std::string& module_name, int timeoutMs = 15000
}
if (_log) _log->warn("Timeout: module '{}' not found in process after {} ms.", module_name, timeoutMs);
return false;
return MODULEINFO{};
}
std::string Memory::ByteToHexEscaped(const BYTE byte) {
@@ -121,14 +121,38 @@ uint8_t* Memory::AOBScan(
DWORD protect_flags = PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | PAGE_READWRITE | PAGE_EXECUTE_WRITECOPY,
std::shared_ptr<spdlog::logger> log) {
_log = log;
if (!WaitForModule(module_name))
{
if (log) log->warn("Skipping AOB scan because module '{}' is unavailable.", module_name);
return nullptr;
}
bool found = false;
// Convert signature to bytes
_log = log;
HANDLE hProc = GetCurrentProcess();
MODULEINFO modInfo{};
HMODULE targetModule = nullptr;
// Get module when name is specidifed
if (!(module_name.empty() || module_name == "*")) {
if (_log) _log->info("Module name: {}", module_name);
MODULEINFO modinfo = WaitForModule(module_name);
if (modinfo.lpBaseOfDll == nullptr) {
if (_log) _log->warn("Skipping AOB scan because module '{}' is unavailable.", module_name);
return nullptr;
}
}
// Fallback to determine module loaded
if (!found || module_name.empty() || module_name == "*") {
char exeBuf[MAX_PATH] = { 0 };
DWORD exeLen = GetModuleFileNameA(nullptr, exeBuf, MAX_PATH);
std::string exeName = (exeLen > 0) ? std::string(exeBuf, exeBuf + exeLen) : std::string();
size_t pos = exeName.find_last_of("\\/");
if (pos != std::string::npos) exeName = exeName.substr(pos + 1);
if (_log && !exeName.empty()) _log->info("Module name: {}", exeName);
targetModule = GetModuleHandleA(nullptr);
if (!targetModule || !GetModuleInformation(hProc, targetModule, &modInfo, sizeof(modInfo))) {
if (_log) _log->error("Failed to find main module.");
return nullptr;
}
}
// Convert AOB string into vector bytes
std::vector<int> pattern_bytes;
std::istringstream stream(signature);
std::string byte_str;
@@ -140,72 +164,52 @@ uint8_t* Memory::AOBScan(
pattern_bytes.push_back(static_cast<int>(std::strtol(byte_str.c_str(), nullptr, 16)));
}
HMODULE hMods[1024];
DWORD cbNeeded;
HANDLE hProc = GetCurrentProcess();
if (!EnumProcessModules(hProc, hMods, sizeof(hMods), &cbNeeded))
{
spdlog::error("EnumProcessModules failed.");
if (pattern_bytes.empty()) {
if (_log) _log->warn("Empty AOB pattern passed.");
return nullptr;
}
// Logging scanning area
uint8_t* base = reinterpret_cast<uint8_t*>(modInfo.lpBaseOfDll);
size_t size = modInfo.SizeOfImage;
if (_log) _log->info("Scanning memory region: 0x{:X} - 0x{:X}",
reinterpret_cast<uintptr_t>(base), reinterpret_cast<uintptr_t>(base + size));
for (unsigned int i = 0; i < (cbNeeded / sizeof(HMODULE)); ++i)
// Memory scan
MEMORY_BASIC_INFORMATION mbi{};
for (uint8_t* current = base; current < base + size;)
{
char modName[MAX_PATH];
if (GetModuleBaseNameA(hProc, hMods[i], modName, sizeof(modName)))
{
if (_stricmp(modName, module_name.c_str()) == 0)
if (!VirtualQuery(current, &mbi, sizeof(mbi)))
break;
bool isCommitted = (mbi.State & MEM_COMMIT) != 0;
bool hasAccess = (mbi.Protect & protect_flags) != 0;
bool isNoAccess = (mbi.Protect & PAGE_NOACCESS) != 0;
bool isGuard = (mbi.Protect & PAGE_GUARD) != 0;
if (isCommitted && hasAccess && !isNoAccess && !isGuard) {
uint8_t* regionBase = reinterpret_cast<uint8_t*>(mbi.BaseAddress);
size_t regionSize = mbi.RegionSize;
for (size_t i = 0; i <= regionSize - pattern_bytes.size(); ++i)
{
MODULEINFO modInfo;
if (!GetModuleInformation(hProc, hMods[i], &modInfo, sizeof(modInfo)))
bool match = true;
for (size_t j = 0; j < pattern_bytes.size(); ++j)
{
if (log) log->error("GetModuleInformation failed for '{}'", module_name);
return nullptr;
}
uint8_t* base = reinterpret_cast<uint8_t*>(modInfo.lpBaseOfDll);
size_t size = modInfo.SizeOfImage;
if (log) log->info("Scanning memory region: 0x{:X} - 0x{:X}", reinterpret_cast<uintptr_t>(base), reinterpret_cast<uintptr_t>(base + size));
MEMORY_BASIC_INFORMATION mbi{};
for (uint8_t* current = base; current < base + size;)
{
if (!VirtualQuery(current, &mbi, sizeof(mbi)))
if (pattern_bytes[j] != -1 && regionBase[i + j] != static_cast<uint8_t>(pattern_bytes[j])) {
match = false;
break;
if ((mbi.State & MEM_COMMIT) && (mbi.Protect & protect_flags))
{
for (size_t i = 0; i <= mbi.RegionSize - pattern_bytes.size(); ++i)
{
bool match = true;
for (size_t j = 0; j < pattern_bytes.size(); ++j)
{
if (pattern_bytes[j] != -1 && current[i + j] != static_cast<uint8_t>(pattern_bytes[j]))
{
match = false;
break;
}
}
if (match)
{
uint8_t* result = current + i;
return result;
}
}
}
current = reinterpret_cast<uint8_t*>(mbi.BaseAddress) + mbi.RegionSize;
}
if (log) log->warn("No AOB match found in module '{}'.", module_name);
return nullptr;
if (match) {
uint8_t* result = regionBase + i;
return result;
}
}
}
}
if (log) log->warn("Module '{}' unexpectedly disappeared during scan.", module_name);
current = reinterpret_cast<uint8_t*>(mbi.BaseAddress) + mbi.RegionSize;
}
return nullptr;
}