#include "STDInclude.hpp" namespace Main { void SetEnvironment() { wchar_t exeName[512]; GetModuleFileName(GetModuleHandle(nullptr), exeName, sizeof(exeName) / 2); wchar_t* exeBaseName = wcsrchr(exeName, L'\\'); exeBaseName[0] = L'\0'; SetCurrentDirectory(exeName); } void Initialize() { Main::SetEnvironment(); Utils::Cryptography::Initialize(); Components::Loader::Initialize(); #if defined(DEBUG) || defined(FORCE_UNIT_TESTS) if (Components::Loader::PerformingUnitTests()) { DWORD result = (Components::Loader::PerformUnitTests() ? 0 : -1); Components::Loader::Uninitialize(); ExitProcess(result); } #else if (Components::Flags::HasFlag("tests")) { Components::Logger::Print("Unit tests are disabled outside the debug environment!\n"); } #endif } void Uninitialize() { Components::Loader::Uninitialize(); Utils::Cache::Uninitialize(); google::protobuf::ShutdownProtobufLibrary(); } __declspec(naked) void EntryPoint() { __asm { pushad call Main::Initialize popad push 6BAC14h // Continue init routine push 6CA062h // ___security_init_cookie retn } } } BOOL APIENTRY DllMain(HMODULE /*hModule*/, DWORD ul_reason_for_call, LPVOID /*lpReserved*/) { if (ul_reason_for_call == DLL_PROCESS_ATTACH) { // Not sure if it conflicts with our TLS variables //DisableThreadLibraryCalls(hModule); Steam::Proxy::RunMod(); // Ensure we're working with our desired binary if (Utils::Hook::Get(0x4C0FFF) != 0x6824748B) return FALSE; #ifndef DISABLE_ANTICHEAT []() { Components::AntiCheat::ProtectProcess(); }(); #endif DWORD oldProtect; std::uint8_t* module = reinterpret_cast(GetModuleHandle(nullptr)); //VirtualProtect(module, 0x6C73000, PAGE_EXECUTE_READWRITE, &oldProtect); // Unprotect the entire process VirtualProtect(module + 0x1000, 0x2D6000, PAGE_EXECUTE_READ, &oldProtect); // Protect the .text segment // Install entry point hook Utils::Hook(0x6BAC0F, Main::EntryPoint, HOOK_JUMP).install()->quick(); } else if (ul_reason_for_call == DLL_PROCESS_DETACH) { Main::Uninitialize(); } return TRUE; }