using System.Collections.Generic; using BurnOutSharp.ExecutableType.Microsoft.PE; using BurnOutSharp.Interfaces; using BurnOutSharp.Matching; namespace BurnOutSharp.ProtectionType { // TODO: Do more research into the Cucko protection: // - Reference to `EASTL` and `EAStdC` are standard for EA products and does not indicate Cucko by itself // - There's little information outside of PiD detection that actually knows about Cucko // - Cucko is confirmed to, at least, use DMI checks. public class Cucko : IPortableExecutableCheck { /// public string CheckPortableExecutable(string file, PortableExecutable pex, bool includeDebug) { // Get the sections from the executable, if possible var sections = pex?.SectionTable; if (sections == null) return null; // Get the .text section, if it exists if (pex.TextSectionRaw == null) return null; var matchers = new List { // Confirmed to detect most examples known of Cucko. The only known exception is the version of "TSLHost.dll" included on Redump entry 36119. // ŠU‰8...…™...ŠUŠ8T... new ContentMatchSet(new byte?[] { 0x8A, 0x55, 0x89, 0x38, 0x14, 0x1E, 0x0F, 0x85, 0x99, 0x00, 0x00, 0x00, 0x8A, 0x55, 0x8A, 0x38, 0x54, 0x1E, 0x01, 0x0F }, "Cucko (EA Custom)") }; return MatchUtil.GetFirstMatch(file, pex.TextSectionRaw, matchers, includeDebug); } } }