1 #include "fixscancodemap.h"
\r
3 #include "windowstool.h"
\r
5 #include <tlhelp32.h>
\r
7 #pragma runtime_checks( "", off )
\r
8 static DWORD WINAPI invokeFunc(InjectInfo *info)
\r
15 FpImpersonateLoggedOnUser pImpersonateLoggedOnUser;
\r
16 FpRevertToSelf pRevertToSelf;
\r
17 FpOpenProcessToken pOpenProcessToken;
\r
19 hAdvapi32 = info->pGetModuleHandle(info->advapi32_);
\r
21 pImpersonateLoggedOnUser = (FpImpersonateLoggedOnUser)info->pGetProcAddress(hAdvapi32, info->impersonateLoggedOnUser_);
\r
22 pRevertToSelf = (FpRevertToSelf)info->pGetProcAddress(hAdvapi32, info->revertToSelf_);
\r
23 pOpenProcessToken = (FpOpenProcessToken)info->pGetProcAddress(hAdvapi32, info->openProcessToken_);
\r
25 HANDLE hProcess = info->pOpenProcess(PROCESS_QUERY_INFORMATION, FALSE, info->pid_);
\r
26 if (hProcess == NULL) {
\r
31 ret = pOpenProcessToken(hProcess, TOKEN_QUERY | TOKEN_DUPLICATE , &hToken);
\r
37 ret = pImpersonateLoggedOnUser(hToken);
\r
43 if (info->isVistaOrLater_) {
\r
46 info->pUpdate8(0, 1);
\r
49 ret = pRevertToSelf();
\r
56 if (hToken != NULL) {
\r
57 info->pCloseHandle(hToken);
\r
60 if (hProcess != NULL) {
\r
61 info->pCloseHandle(hProcess);
\r
66 static int afterFunc(int arg)
\r
69 // if this function empty, optimizer unify this with other empty functions.
\r
70 // following code avoid it.
\r
71 arg *= 710810; // non-sense operation
\r
74 #pragma runtime_checks( "", restore )
\r
76 const DWORD FixScancodeMap::s_fixEntryNum = 4;
\r
77 const DWORD FixScancodeMap::s_fixEntry[] = {
\r
84 int FixScancodeMap::acquirePrivileges()
\r
87 HANDLE hToken = NULL;
\r
89 if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken)) {
\r
95 if (!LookupPrivilegeValue(NULL, SE_DEBUG_NAME, &luid)) {
\r
100 TOKEN_PRIVILEGES tk_priv;
\r
101 tk_priv.PrivilegeCount = 1;
\r
102 tk_priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
\r
103 tk_priv.Privileges[0].Luid = luid;
\r
105 if (!AdjustTokenPrivileges(hToken, FALSE, &tk_priv, 0, NULL, NULL)) {
\r
111 if (hToken != NULL) {
\r
112 CloseHandle(hToken);
\r
118 DWORD FixScancodeMap::getWinLogonPid()
\r
121 DWORD mySessionId = 0;
\r
123 if (ProcessIdToSessionId(GetCurrentProcessId(), &mySessionId) == FALSE) {
\r
127 HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
\r
128 if (hSnap == INVALID_HANDLE_VALUE) {
\r
133 pe.dwSize = sizeof(pe);
\r
135 BOOL bResult = Process32First(hSnap, &pe);
\r
137 if (!_tcsicmp(pe.szExeFile, _T("winlogon.exe"))) {
\r
140 if (ProcessIdToSessionId(pe.th32ProcessID, &sessionId) != FALSE) {
\r
141 if (sessionId == mySessionId) {
\r
142 pid = pe.th32ProcessID;
\r
147 bResult = Process32Next(hSnap, &pe);
\r
150 CloseHandle(hSnap);
\r
155 bool FixScancodeMap::clean(WlInfo wl)
\r
159 if (wl.m_hThread != NULL) {
\r
162 if (WaitForSingleObject(wl.m_hThread, 5000) == WAIT_TIMEOUT) {
\r
166 GetExitCodeThread(wl.m_hThread, &result);
\r
167 CloseHandle(wl.m_hThread);
\r
169 if (wl.m_remoteMem != NULL && wl.m_hProcess != NULL) {
\r
170 VirtualFreeEx(wl.m_hProcess, wl.m_remoteMem, 0, MEM_RELEASE);
\r
173 if (wl.m_remoteInfo != NULL && wl.m_hProcess != NULL) {
\r
174 VirtualFreeEx(wl.m_hProcess, wl.m_remoteInfo, 0, MEM_RELEASE);
\r
177 if (wl.m_hProcess != NULL) {
\r
178 CloseHandle(wl.m_hProcess);
\r
186 int FixScancodeMap::injectThread(DWORD dwPID)
\r
193 wi.m_hProcess = NULL;
\r
194 wi.m_remoteMem = NULL;
\r
195 wi.m_remoteInfo = NULL;
\r
196 wi.m_hThread = NULL;
\r
198 DWORD invokeFuncAddr = (DWORD)invokeFunc;
\r
199 DWORD afterFuncAddr = (DWORD)afterFunc;
\r
200 DWORD memSize = afterFuncAddr - invokeFuncAddr;
\r
202 if ((wi.m_hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, dwPID)) == NULL) {
\r
207 wi.m_remoteMem = VirtualAllocEx(wi.m_hProcess, NULL, memSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
\r
208 if (wi.m_remoteMem == NULL) {
\r
210 err = GetLastError();
\r
214 wFlag = WriteProcessMemory(wi.m_hProcess, wi.m_remoteMem, (char*)invokeFunc, memSize, (SIZE_T*)0);
\r
215 if (wFlag == FALSE) {
\r
220 wi.m_remoteInfo = VirtualAllocEx(wi.m_hProcess, NULL, sizeof(m_info), MEM_COMMIT, PAGE_READWRITE);
\r
221 if (wi.m_remoteInfo == NULL) {
\r
223 err = GetLastError();
\r
227 wFlag = WriteProcessMemory(wi.m_hProcess, wi.m_remoteInfo, (char*)&m_info, sizeof(m_info), (SIZE_T*)0);
\r
228 if (wFlag == FALSE) {
\r
236 _stprintf_s(buf, sizeof(buf)/sizeof(buf[0]),
\r
237 _T("execute UpdatePerUserSystemParameters(), inject code to winlogon.exe?\r\n")
\r
238 _T("invokeFunc=0x%p\r\n")
\r
239 _T("afterFunc=0x%p\r\n")
\r
240 _T("afterFunc - invokeFunc=%d\r\n")
\r
241 _T("remoteMem=0x%p\r\n")
\r
242 _T("remoteInfo=0x%p(size: %d)\r\n"),
\r
243 invokeFunc, afterFunc, memSize, m_remoteMem, m_remoteInfo, sizeof(m_info));
\r
244 if (MessageBox((HWND)NULL, buf, _T("upusp"), MB_OKCANCEL | MB_ICONSTOP) == IDCANCEL) {
\r
245 (m_info.pUpdate)(0, 1);
\r
250 wi.m_hThread = CreateRemoteThread(wi.m_hProcess, NULL, 0,
\r
251 (LPTHREAD_START_ROUTINE)wi.m_remoteMem, wi.m_remoteInfo, 0, NULL);
\r
252 if (wi.m_hThread == NULL) {
\r
257 if (WaitForSingleObject(wi.m_hThread, 5000) == WAIT_TIMEOUT) {
\r
259 m_wlTrash.push_back(wi);
\r
263 GetExitCodeThread(wi.m_hThread, &result);
\r
265 CloseHandle(wi.m_hThread);
\r
266 wi.m_hThread = NULL;
\r
269 if (wi.m_remoteMem != NULL && wi.m_hProcess != NULL) {
\r
270 VirtualFreeEx(wi.m_hProcess, wi.m_remoteMem, 0, MEM_RELEASE);
\r
271 wi.m_remoteMem = NULL;
\r
274 if (wi.m_remoteInfo != NULL && wi.m_hProcess != NULL) {
\r
275 VirtualFreeEx(wi.m_hProcess, wi.m_remoteInfo, 0, MEM_RELEASE);
\r
276 wi.m_remoteInfo = NULL;
\r
279 if (wi.m_hProcess != NULL) {
\r
280 CloseHandle(wi.m_hProcess);
\r
281 wi.m_hProcess = NULL;
\r
288 int FixScancodeMap::update()
\r
290 MINIMIZEDMETRICS mm;
\r
293 if (m_errorOnConstruct) {
\r
294 result = m_errorOnConstruct;
\r
298 m_wlTrash.erase(remove_if(m_wlTrash.begin(), m_wlTrash.end(), FixScancodeMap::clean), m_wlTrash.end());
\r
300 memset(&mm, 0, sizeof(mm));
\r
301 mm.cbSize = sizeof(mm);
\r
302 SystemParametersInfo(SPI_GETMINIMIZEDMETRICS, sizeof(mm), &mm, 0);
\r
304 result = injectThread(m_winlogonPid);
\r
305 if (result == 14) {
\r
307 result = injectThread(m_winlogonPid);
\r
313 SystemParametersInfo(SPI_SETMINIMIZEDMETRICS, sizeof(mm), &mm, 0);
\r
319 int FixScancodeMap::fix()
\r
321 ScancodeMap *origMap, *fixMap;
\r
322 DWORD origSize, fixSize;
\r
326 // save original Scancode Map
\r
327 ret = m_pReg->read(_T("Scancode Map"), NULL, &origSize, NULL, 0);
\r
329 origMap = reinterpret_cast<ScancodeMap*>(malloc(origSize));
\r
330 if (origMap == NULL) {
\r
335 ret = m_pReg->read(_T("Scancode Map"), reinterpret_cast<BYTE*>(origMap), &origSize, NULL, 0);
\r
336 if (ret == false) {
\r
341 fixSize = origSize;
\r
342 fixMap = reinterpret_cast<ScancodeMap*>(malloc(origSize + s_fixEntryNum * sizeof(s_fixEntry[0])));
\r
343 if (fixMap == NULL) {
\r
348 memcpy_s(fixMap, origSize + s_fixEntryNum, origMap, origSize);
\r
353 fixSize = sizeof(ScancodeMap);
\r
354 fixMap = reinterpret_cast<ScancodeMap*>(malloc(sizeof(ScancodeMap) + s_fixEntryNum * sizeof(s_fixEntry[0])));
\r
355 if (fixMap == NULL) {
\r
360 fixMap->header1 = 0;
\r
361 fixMap->header2 = 0;
\r
363 fixMap->entry[0] = 0;
\r
366 for (DWORD i = 0; i < s_fixEntryNum; i++) {
\r
370 for (DWORD j = 0; j < origMap->count; j++) {
\r
371 if (HIWORD(s_fixEntry[i]) == HIWORD(origMap->entry[j])) {
\r
378 // s_fixEntry[i] found in original Scancode Map, so don't fix it
\r
382 // add fix entry to fixMap
\r
383 fixMap->entry[fixMap->count - 1] = s_fixEntry[i];
\r
384 fixMap->entry[fixMap->count] = 0;
\r
389 ret = m_pReg->write(_T("Scancode Map"), reinterpret_cast<BYTE*>(fixMap), fixSize);
\r
390 if (ret == false) {
\r
398 ret = m_pReg->write(_T("Scancode Map"), reinterpret_cast<BYTE*>(origMap), origSize);
\r
400 ret = m_pReg->remove(_T("Scancode Map"));
\r
402 if (ret == false) {
\r
417 int FixScancodeMap::restore()
\r
422 FixScancodeMap::FixScancodeMap() :
\r
423 m_errorOnConstruct(0),
\r
425 m_regHKCU(HKEY_CURRENT_USER, _T("Keyboard Layout")),
\r
426 m_regHKLM(HKEY_LOCAL_MACHINE, _T("SYSTEM\\CurrentControlSet\\Control\\Keyboard Layout")),
\r
431 m_info.pid_ = GetCurrentProcessId();
\r
433 memcpy(&m_info.advapi32_, _T("advapi32.dll"), sizeof(m_info.advapi32_));
\r
434 memcpy(&m_info.impersonateLoggedOnUser_, "ImpersonateLoggedOnUser", sizeof(m_info.impersonateLoggedOnUser_));
\r
435 memcpy(&m_info.revertToSelf_, "RevertToSelf", sizeof(m_info.revertToSelf_));
\r
436 memcpy(&m_info.openProcessToken_, "OpenProcessToken", sizeof(m_info.openProcessToken_));
\r
438 hMod = GetModuleHandle(_T("user32.dll"));
\r
439 if (hMod != NULL) {
\r
440 m_info.pUpdate4 = (FpUpdatePerUserSystemParameters4)GetProcAddress(hMod, "UpdatePerUserSystemParameters");
\r
441 m_info.pUpdate8 = (FpUpdatePerUserSystemParameters8)m_info.pUpdate4;
\r
442 if (m_info.pUpdate4 == NULL) {
\r
447 hMod = GetModuleHandle(_T("kernel32.dll"));
\r
448 if (hMod != NULL) {
\r
449 m_info.pGetModuleHandle = (FpGetModuleHandleW)GetProcAddress(hMod, "GetModuleHandleW");
\r
450 if (m_info.pGetModuleHandle == NULL) {
\r
454 m_info.pGetProcAddress = (FpGetProcAddress)GetProcAddress(hMod, "GetProcAddress");
\r
455 if (m_info.pGetProcAddress == NULL) {
\r
459 m_info.pOpenProcess = (FpOpenProcess)GetProcAddress(hMod, "OpenProcess");
\r
460 if (m_info.pOpenProcess == NULL) {
\r
464 m_info.pCloseHandle = (FpCloseHandle)GetProcAddress(hMod, "CloseHandle");
\r
465 if (m_info.pCloseHandle == NULL) {
\r
470 // Windows7 RC not support Scancode Map on HKCU?
\r
471 if (checkWindowsVersion(6, 1) == FALSE) {
\r
472 m_pReg = &m_regHKCU; // Vista or earlier
\r
474 m_pReg = &m_regHKLM; // Windows7 or later
\r
477 // prototype of UpdatePerUserSystemParameters() differ vista or earlier
\r
478 if (checkWindowsVersion(6, 0) == FALSE) {
\r
479 m_info.isVistaOrLater_ = 0; // before Vista
\r
481 m_info.isVistaOrLater_ = 1; // Vista or later
\r
484 m_errorOnConstruct = acquirePrivileges();
\r
485 if (m_errorOnConstruct) {
\r
489 if ((m_winlogonPid = getWinLogonPid()) == 0) {
\r
490 m_errorOnConstruct = 15;
\r
498 FixScancodeMap::~FixScancodeMap()
\r