亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? memscan.c.svn-base

?? 這是一段游戲修改工具的源代碼.ring3功能由dephi開發(fā),驅(qū)動是C開發(fā).希望對大家有幫助
?? SVN-BASE
?? 第 1 頁 / 共 3 頁
字號:
#include "ntifs.h"
#include <windef.h>
#ifdef CETC
#include "tdiwrapper.h"
#include "kfiles.h"
#endif
#include "memscan.h"
#include "DBKFunc.h"
#include "vmxhelper.h"
#include "rootkit.h"


BOOLEAN IsAddressSafe(UINT_PTR StartAddress)
{


	//note: Add support for PAE enabled systems
	//return TRUE;
#ifdef AMD64
	return TRUE; //for now
#endif
/*	MDL x;

	
	MmProbeAndLockPages(&x,KernelMode,IoModifyAccess);


	MmUnlockPages(&x);
	*/
	ULONG kernelbase=0x7ffe0000;

	if ((!HiddenDriver) && (StartAddress<kernelbase))
		return TRUE;

    {
		UINT_PTR PTE,PDE;
		struct PTEStruct *x;
		
		/*
		PHYSICAL_ADDRESS physical;
		physical=MmGetPhysicalAddress((PVOID)StartAddress);
		return (physical.QuadPart!=0);*/


		PTE=(UINT_PTR)StartAddress;
		PTE=PTE/0x1000*PTESize+0xc0000000;

    	//now check if the address in PTE is valid by checking the page table directory at 0xc0300000 (same location as CR3 btw)
	    PDE=PTE/0x1000*PTESize+0xc0000000; //same formula

		x=(PVOID)PDE;
		if ((x->P==0) && (x->A2==0))
		{
			//Not present or paged, and since paging in this area isn't such a smart thing to do just skip it
			//perhaps this is only for the 4 mb pages, but those should never be paged out, so it should be 1
			//bah, I've got no idea what this is used for
			return FALSE;
		}

		if (x->PS==1)
		{
			//This is a 4 MB page (no pte list)
			//so, (startaddress/0x400000*0x400000) till ((startaddress/0x400000*0x400000)+(0x400000-1) ) ) is specified by this page
		}
		else //if it's not a 4 MB page then check the PTE
		{
			//still here so the page table directory agreed that it is a usable page table entry
			x=(PVOID)PTE;
			if ((x->P==0) && (x->A2==0))
				return FALSE; //see for explenation the part of the PDE
		}

		return TRUE;
	} 

}

ULONG getPEThread(ULONG threadid)  
{	
    //UINT_PTR *threadid;
	PETHREAD selectedthread;
	ULONG result=0;
	

	if (PsLookupThreadByThreadId((PVOID)threadid,&selectedthread)==STATUS_SUCCESS)
	{
		result=(ULONG)selectedthread;
		ObDereferenceObject(selectedthread);
	}

	return result;
}

BOOLEAN WriteProcessMemory(DWORD PID,PEPROCESS PEProcess,PVOID Address,DWORD Size, PVOID Buffer)
{
	PEPROCESS selectedprocess=PEProcess;
	KAPC_STATE apc_state;
	NTSTATUS ntStatus=STATUS_SUCCESS;

	if (selectedprocess==NULL)
	{
		DbgPrint("WriteProcessMemory:Getting PEPROCESS\n");
        if (!NT_SUCCESS(PsLookupProcessByProcessId((PVOID)PID,&selectedprocess)))
		   return FALSE; //couldn't get the PID

		DbgPrint("Retrieved peprocess");  
	}

	//selectedprocess now holds a valid peprocess value
	__try
	{
		unsigned int temp=(unsigned int)Address;
						
		RtlZeroMemory(&apc_state,sizeof(apc_state));					

    	KeAttachProcess((PEPROCESS)selectedprocess);				

        __try
        {
			char* target;
			char* source;
			unsigned int i;	

			DbgPrint("Checking safety of memory\n");

			if ((!IsAddressSafe((ULONG)Address)) || (!IsAddressSafe((ULONG)Address+Size-1)))
				return FALSE; //if the first or last byte of this region is not safe then exit; //I know I should also check the regions inbetween, but since my own dll doesn't request more than 512 bytes it wont overlap

    		//still here, then I gues it's safe to read. (But I can't be 100% sure though, it's still the users problem if he accesses memory that doesn't exist)

			DbgPrint("Copying memory to target\n");
			target=Address;
			source=Buffer;
			for (i=0; i<Size; i++)
			{
               target[i]=source[i];
			}

			ntStatus = STATUS_SUCCESS;							
		}
		__finally
		{
			KeDetachProcess();
		}
	}			
	__except(1)
	{
		DbgPrint("Error while writing\n");
		ntStatus = STATUS_UNSUCCESSFUL;
	}
	
	if (PEProcess==NULL) //no valid peprocess was given so I made a reference, so lets also dereference
		ObDereferenceObject(selectedprocess);

	return NT_SUCCESS(ntStatus);
}


BOOLEAN ReadProcessMemory(DWORD PID,PEPROCESS PEProcess,PVOID Address,DWORD Size, PVOID Buffer)
{
	PEPROCESS selectedprocess=PEProcess;
	//KAPC_STATE apc_state;
	NTSTATUS ntStatus=STATUS_SUCCESS;

	if (PEProcess==NULL)
	{
		//DbgPrint("ReadProcessMemory:Getting PEPROCESS\n");
        if (!NT_SUCCESS(PsLookupProcessByProcessId((PVOID)PID,&selectedprocess)))
		   return FALSE; //couldn't get the PID

		//DbgPrint("Retrieved peprocess");  
	}

	//DbgPrint("a");

	//selectedprocess now holds a valid peprocess value
	__try
	{
		unsigned int temp=(unsigned int)Address;
		ULONG currentcr3;
		//DbgPrint("b");
		
		/*				
		RtlZeroMemory(&apc_state,sizeof(apc_state));					

		RtlZeroMemory(Buffer,Size);*/

		//DbgPrint("c");
		/*
		__asm
		{
			mov eax,cr3
			mov currentcr3,eax
		}*/
		//DbgPrint("d");
		//DbgPrint("%d: Before: PEProcess=%x ProcessID=%x CR3=%x (real=%x)\n",cpunr(), (ULONG)PsGetCurrentProcess(), PsGetCurrentProcessId(), currentcr3, vmx_getRealCR3());
    	KeAttachProcess((PEPROCESS)selectedprocess);

		/*
		//DbgPrint("e");
		__asm
		{
			mov eax,cr3
			mov currentcr3,eax
		}
		//DbgPrint("%d: After: PEProcess=%x ProcessID=%x CR3=%x (real=%x)\n",cpunr(), (ULONG)PsGetCurrentProcess(), PsGetCurrentProcessId(), currentcr3, vmx_getRealCR3());
*/

        __try
        {
			char* target;
			char* source;
			unsigned int i;	

			//DbgPrint("Checking safety of memory\n");

			if ((!IsAddressSafe((ULONG)Address)) || (!IsAddressSafe((ULONG)Address+Size-1)))
				return FALSE; //if the first or last byte of this region is not safe then exit;

    		//still here, then I gues it's safe to read. (But I can't be 100% sure though, it's still the users problem if he accesses memory that doesn't exist)

			//DbgPrint("Copying memory to target\n");
			target=Buffer;
			source=Address;
			RtlCopyMemory(target,source,Size);
			ntStatus = STATUS_SUCCESS;	
		}
		__finally
		{
		/*	unsigned long long a;
			a=getTSC()+1000000000;
			//DbgPrint("a=%d getTSC()=%d",a,getTSC());
			while (getTSC() < a)
			{
				__asm
				{
					pushad
					pause
					cpuid					
					popad
				}

			}

			
			__asm
			{
				mov eax,cr3
				mov currentcr3,eax
			}*/
			//DbgPrint("%d: Before going back: PEProcess=%x ProcessID=%x CR3=%x (real=%x)\n",cpunr(), (ULONG)PsGetCurrentProcess(), PsGetCurrentProcessId(), currentcr3, vmx_getRealCR3());

			KeDetachProcess();
		}
	}			
	__except(1)
	{
		DbgPrint("Error while reading\n");
		ntStatus = STATUS_UNSUCCESSFUL;
	}
	
	if (PEProcess==NULL) //no valid peprocess was given so I made a reference, so lets also dereference
		ObDereferenceObject(selectedprocess);

	return NT_SUCCESS(ntStatus);
}

NTSTATUS ReadPhysicalMemory(char *startaddress, UINT_PTR bytestoread, void *output)
{
	HANDLE			physmem;
	UNICODE_STRING	physmemString;
	OBJECT_ATTRIBUTES attributes;
	WCHAR			physmemName[] = L"\\device\\physicalmemory";
	UCHAR*			memoryview;
	NTSTATUS		ntStatus = STATUS_UNSUCCESSFUL;

	__try
	{
		RtlInitUnicodeString( &physmemString, physmemName );	

		InitializeObjectAttributes( &attributes, &physmemString, OBJ_CASE_INSENSITIVE, NULL, NULL );	
		ntStatus=ZwOpenSection( &physmem, SECTION_MAP_READ, &attributes );
		if (ntStatus==STATUS_SUCCESS)
		{
			//hey look, it didn't kill it


			UINT_PTR length;
			PHYSICAL_ADDRESS	viewBase;
			UINT_PTR offset;
			UINT_PTR toread;

			viewBase.QuadPart = (ULONGLONG)(startaddress);					
			
			length=0x2000;//pinp->bytestoread; //in case of a overlapping region
			toread=bytestoread;

			memoryview=NULL;
			ntStatus=ZwMapViewOfSection(
				physmem,  //sectionhandle
				NtCurrentProcess(), //processhandle (should be -1)
				&memoryview, //BaseAddress
				0L, //ZeroBits
				length, //CommitSize
				&viewBase, //SectionOffset
				&length, //ViewSize
				ViewShare,
				0,
				PAGE_READWRITE);

			if (ntStatus==STATUS_SUCCESS)
			{
				offset=(UINT_PTR)(startaddress)-(UINT_PTR)viewBase.QuadPart;
				RtlCopyMemory(output,&memoryview[offset],toread);

				ZwUnmapViewOfSection( NtCurrentProcess(), memoryview);
			};

			ZwClose(physmem);
		};

	}
	__except(1)
	{
		DbgPrint("Error while reading physical memory\n");
	}

	return ntStatus;
}

BOOLEAN GetMemoryRegionData(DWORD PID,PEPROCESS PEProcess, PVOID mempointer,ULONG *regiontype, DWORD *memorysize,DWORD *baseaddress)
{
	UINT_PTR StartAddress;
	KAPC_STATE apc_state;
	NTSTATUS ntStatus=STATUS_SUCCESS;
	struct PTEStruct *PPTE,*PPDE;
	PEPROCESS selectedprocess=PEProcess;

	if (PEProcess==NULL)
	{
		DbgPrint("GetMemoryRegionData:Getting PEPROCESS\n");
        if (!NT_SUCCESS(PsLookupProcessByProcessId((PVOID)PID,&selectedprocess)))
		   return FALSE; //couldn't get the PID

		DbgPrint("Retrieved peprocess");  
	}

	StartAddress=(UINT_PTR)mempointer;

	*baseaddress=((StartAddress) /0x1000) *0x1000;

	//switch context to the target process

	RtlZeroMemory(&apc_state,sizeof(apc_state));

	__try
	{
		KeAttachProcess((PEPROCESS)selectedprocess);
		__try
		{
			//do my stuff here


			(UINT_PTR)PPTE=*baseaddress / 0x1000 *PTESize+0xc0000000;
			(UINT_PTR)PPDE=((UINT_PTR)PPTE) / 0x1000 *PTESize+0xc0000000;

			//DbgPrint("PPTE=%p\nPPDE=%p\n",PPTE,PPDE);
			if ((PPDE->P==0) && (PPDE->A2==0))
			{
				//Not paged
    			//thats 4KB of PTE, wich is 1024 PTE's wich is 4096*1024 bytes wich is 4MB non-paged memory(in case of PAE obnlt 512 PTE's wich is 4096*512=2MB)
				UINT_PTR BaseAddressOfPDE;
					
				BaseAddressOfPDE=(((UINT_PTR)PPDE)-0xc0000000)/PTESize * 0x1000 ; //=address of pte (if it had one)
				BaseAddressOfPDE=((BaseAddressOfPDE)-0xc0000000)/PTESize * 0x1000 ; //=*baseaddress that this PDE points too . (Actually, just looking at the last 3 hex digits and filling the rest with 0's should also have worked)

				*memorysize=PAGE_SIZE_LARGE-(*baseaddress-BaseAddressOfPDE);
				*regiontype=PAGE_NOACCESS;
				(UINT_PTR)PPDE=(UINT_PTR)PPDE+PTESize;  //perhaps PPDE++ also works but at least I'm sure this works
				(UINT_PTR)PPTE=((UINT_PTR)(PPDE)-0xc0000000)/PTESize*0x1000; //point to the first PTE of the new PDE
			}
			else
			if (PPDE->PS) //it's a 4mb page meaning the PTE is invalid
			{
				UINT_PTR BaseAddressOfPDE;
					
				BaseAddressOfPDE=(((UINT_PTR)PPDE)-0xc0000000)/PTESize * 0x1000 ; //=address of pte (if it had one)
				BaseAddressOfPDE=((BaseAddressOfPDE)-0xc0000000)/PTESize * 0x1000 ; //=*baseaddress that this PDE points too . (Actually, just looking at the last 3 hex digits and filling the rest with 0's should also have worked)
				//find the *baseaddress in this 4 MB page

				*memorysize=PAGE_SIZE_LARGE-(*baseaddress-BaseAddressOfPDE);

				if ((PPDE->P)==0)
				{
					if (PPDE->A2==1)
                        *regiontype=PAGE_EXECUTE_READ;
					else
						*regiontype=PAGE_NOACCESS;
				}
				else
				{								
					if (PPDE->RW)
						*regiontype=PAGE_EXECUTE_READWRITE;
					else
		                *regiontype=PAGE_EXECUTE_READ;
				}
					

                //next PDE
				(UINT_PTR)PPDE=(UINT_PTR)PPDE+PTESize;  //perhaps PPDE++ also works but at least I'm sure this works
				(UINT_PTR)PPTE=((UINT_PTR)(PPDE)-0xc0000000)/PTESize*0x1000; //point to the first PTE of the new PDE
			}
			else
			{
				//4 KB
				*memorysize=0x1000;								

				//the PTE is readable
				if ((PPTE->P==0) && (PPTE->A2==0))
					*regiontype=PAGE_NOACCESS;
                else
				{						
					if (PPTE->P==1)
					{
						if (PPTE->RW==1)
							*regiontype=PAGE_EXECUTE_READWRITE;
						else
			                *regiontype=PAGE_EXECUTE_READ;
					}
					else
					{
						//not present, but paged
						//and since I don''t know if it's writable or not lets make it readonly
                        *regiontype=PAGE_EXECUTE_READ;
					}
				}

				(UINT_PTR)PPTE=(UINT_PTR)PPTE+PTESize; //next PTE in the list
    			(UINT_PTR)PPDE=((UINT_PTR)PPTE) / 0x1000 *PTESize+0xc0000000;
			}

			//now the location of the PDE and PTE are set as they should and I can scan the rest of the memory
			//DbgPrint("after first check: PPTE=%p\nPPDE=%p\n",PPTE,PPDE);

			while ((UINT_PTR)PPDE<MAX_PDE_POS)
			{
				//DbgPrint("PPTE=%p(%x)\nPPDE=%p(%x)\n",PPTE,(UINT_PTR)PPTE,PPDE,(UINT_PTR)PPDE);

				if (!((PPDE->P==0) && (PPDE->A2==0)))
				{
					//this is a valid PDE
					if (PPDE->PS==1)
					{
                        //it's a 4 MB PDE (so no PTE)								
						//now check the protection, if it is the same as *regiontype add 4 MB to the size
						//else break out of the loop
						if (*regiontype==PAGE_EXECUTE_READ)
						{
							if ((PPDE->RW==0) || ((PPDE->P==0) && (PPDE->A2==1)) )  //paged to disk, I gues it's read-only
								*memorysize+=PAGE_SIZE_LARGE;
							else
								break; //not the same protection so let's quit
						}
						
						if (*regiontype==PAGE_EXECUTE_READWRITE)
						{
							if ((PPDE->RW==1) && (PPDE->P==1) ) //only if it's present in memory.
								*memorysize+=PAGE_SIZE_LARGE;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩精品一区二区在线| 日韩精品一区在线| 日韩免费一区二区| 欧美经典一区二区三区| 日韩va亚洲va欧美va久久| 欧美日韩一区二区三区在线| 国产福利一区二区三区视频| 色婷婷激情综合| 精品亚洲欧美一区| 欧美剧情片在线观看| 国产三级精品在线| 美女精品一区二区| 69久久夜色精品国产69蝌蚪网 | 久久99国产精品麻豆| 色噜噜夜夜夜综合网| 国产精品日产欧美久久久久| 精品一区二区三区免费视频| 欧美日韩一级片在线观看| 亚洲精品免费看| 一本大道久久精品懂色aⅴ| 中文字幕成人av| 国产 日韩 欧美大片| 久久久久国产一区二区三区四区| 日本不卡在线视频| 日韩一区二区精品| 麻豆极品一区二区三区| 91精品国产综合久久精品麻豆| 亚洲国产精品影院| 69p69国产精品| 人人精品人人爱| 日韩欧美亚洲国产精品字幕久久久 | 日本免费新一区视频 | 99久久精品免费看国产| 中文字幕av免费专区久久| kk眼镜猥琐国模调教系列一区二区| 国产亚洲成aⅴ人片在线观看| 国产精品 日产精品 欧美精品| 26uuu亚洲| 成人免费不卡视频| 日韩毛片精品高清免费| 在线观看亚洲成人| 日韩电影免费在线观看网站| 日韩免费视频线观看| 国产毛片精品国产一区二区三区| 国产香蕉久久精品综合网| av午夜一区麻豆| 亚洲最新视频在线观看| 91精品国产色综合久久| 裸体健美xxxx欧美裸体表演| 久久这里只有精品6| caoporen国产精品视频| 亚洲第一会所有码转帖| 日韩一二三四区| 成人午夜视频网站| 一区二区三区日韩精品视频| 欧美日韩在线播放| 国内成人自拍视频| 日韩毛片视频在线看| 制服视频三区第一页精品| 国产一区二区电影| 亚洲另类一区二区| 精品成人一区二区三区| 91丝袜高跟美女视频| 麻豆中文一区二区| 综合久久给合久久狠狠狠97色| 欧美日韩国产经典色站一区二区三区| 久久精品噜噜噜成人av农村| 日本一二三不卡| 欧美一级久久久| 91美女福利视频| 激情五月播播久久久精品| 亚洲免费观看在线观看| 日韩精品一区二区三区在线观看| 成人av电影在线网| 另类小说色综合网站| 亚洲色图视频免费播放| 久久夜色精品国产欧美乱极品| 色婷婷综合在线| 国产成人精品aa毛片| 日本va欧美va瓶| 日韩高清中文字幕一区| 欧美一区二区三区在线看| 成人高清视频在线观看| 裸体歌舞表演一区二区| 午夜国产精品影院在线观看| 国产精品久久99| 久久综合av免费| 欧美一区二区三区免费观看视频 | 国产精品69毛片高清亚洲| 亚洲国产成人va在线观看天堂| 日本一区二区三区四区在线视频| 日韩一区二区中文字幕| 欧美日韩视频在线一区二区| 97久久精品人人做人人爽| 国产原创一区二区| 日本不卡中文字幕| 日韩精品91亚洲二区在线观看| 中文字幕日韩精品一区| 亚洲国产高清在线观看视频| 久久夜色精品国产噜噜av| 91麻豆精品91久久久久久清纯| 本田岬高潮一区二区三区| 国产精品一级二级三级| 精品一二三四在线| 国产在线播精品第三| 久久99深爱久久99精品| 久久99九九99精品| 麻豆精品国产传媒mv男同| 看电影不卡的网站| 久草中文综合在线| 国产在线国偷精品产拍免费yy| 狠狠v欧美v日韩v亚洲ⅴ| 黄一区二区三区| 国产一区二区免费视频| 国产乱人伦偷精品视频不卡| 国产一区二区精品久久99| 国产精品一二三区| 成人黄色小视频| 99re免费视频精品全部| 在线亚洲高清视频| 精品视频一区二区三区免费| 在线不卡免费av| 日韩三级在线观看| 精品日韩在线观看| 欧美韩国日本一区| 亚洲免费观看高清完整版在线观看熊| 中文字幕在线视频一区| 一区二区三区四区国产精品| 视频一区在线视频| 国产在线精品一区二区三区不卡| 国产69精品久久99不卡| 91麻豆免费在线观看| 欧美日韩五月天| 久久夜色精品一区| 亚洲精品自拍动漫在线| 日本va欧美va精品发布| 国产激情视频一区二区在线观看| 99热精品一区二区| 在线播放中文字幕一区| 国产视频在线观看一区二区三区| 中文字幕五月欧美| 日本不卡高清视频| 成人av电影在线网| 91麻豆精品国产91久久久使用方法 | ww久久中文字幕| 18成人在线视频| 欧美aaa在线| av在线综合网| 欧美日韩中文另类| 国产日韩欧美电影| 亚洲电影视频在线| 国产成人午夜高潮毛片| 欧美视频日韩视频在线观看| 久久久久久免费毛片精品| 一区二区三区欧美亚洲| 激情深爱一区二区| 欧美在线看片a免费观看| 久久亚洲影视婷婷| 午夜欧美一区二区三区在线播放| 国产精品综合一区二区三区| 欧美色区777第一页| 国产亚洲一区字幕| 日韩高清欧美激情| 色欧美片视频在线观看在线视频| 欧美va亚洲va| 亚洲国产aⅴ天堂久久| 国产精品亚洲午夜一区二区三区 | 26uuu国产在线精品一区二区| 亚洲美女视频一区| 成熟亚洲日本毛茸茸凸凹| 欧美一区二区三区啪啪| 艳妇臀荡乳欲伦亚洲一区| 成人av在线资源网站| 欧美精品一区二区三区四区 | 日韩欧美一区在线观看| 亚洲综合一区二区| www.日韩av| 欧美国产精品中文字幕| 精品一区免费av| 91精品国产欧美一区二区| 亚洲综合久久久久| 成+人+亚洲+综合天堂| 欧美日韩你懂得| 亚洲激情中文1区| 97久久超碰精品国产| 国产日韩综合av| 国产精品亚洲专一区二区三区| 欧美日韩国产大片| 一区二区三区日本| 91黄色免费看| 亚洲精品国产成人久久av盗摄| 国产成人av福利| 久久久久久**毛片大全| 激情五月婷婷综合网| 精品免费一区二区三区| 精品一区二区久久久| 26uuu亚洲| 国产成人av一区二区三区在线| 国产人成亚洲第一网站在线播放 | 欧美日韩国产综合久久|