aboutsummaryrefslogtreecommitdiff
path: root/KMemDriver
diff options
context:
space:
mode:
authorToni Uhlig <matzeton@googlemail.com>2019-05-07 22:23:34 +0200
committerToni Uhlig <matzeton@googlemail.com>2019-05-07 22:23:34 +0200
commit3b8ee025edd045b962c21d09dd1ef86e1e48aae4 (patch)
tree294f2015bf65813b6cd23d7cfa265ccd21cd1ac3 /KMemDriver
initial commit
Diffstat (limited to 'KMemDriver')
-rw-r--r--KMemDriver/Driver.c805
-rw-r--r--KMemDriver/Imports.h112
-rw-r--r--KMemDriver/KMemDriver.vcxproj185
-rw-r--r--KMemDriver/KMemDriver.vcxproj.filters29
-rw-r--r--KMemDriver/Native.h82
5 files changed, 1213 insertions, 0 deletions
diff --git a/KMemDriver/Driver.c b/KMemDriver/Driver.c
new file mode 100644
index 0000000..12af90d
--- /dev/null
+++ b/KMemDriver/Driver.c
@@ -0,0 +1,805 @@
+#include "Driver.h"
+#include "Imports.h"
+#include "Native.h"
+
+#include <ntddk.h>
+#include <Ntstrsafe.h>
+
+#define CHEAT_EXE L"KTest.exe"
+
+#ifdef _DEBUG_
+#define KDBG(fmt, ...) DbgPrint("KMemDriver[%01d]: " fmt, KeGetCurrentIrql(), __VA_ARGS__)
+#else
+#define KDBG(fmt, ...)
+#endif
+
+#ifndef _DEBUG_
+#define FNZERO_MARKER() \
+ do { \
+ volatile UINT32 marker = 0xDEADC0DE;\
+ UNREFERENCED_PARAMETER(marker); \
+ } while (0)
+#define FNZERO_FN(fn_start) \
+ do { fn_zero_text((PVOID)fn_start); } while (0)
+#define FNZERO(fn_start) \
+ FNZERO_MARKER(); \
+ FNZERO_FN(fn_start)
+#else
+#define FNZERO_MARKER()
+#define FNZERO_FN(fn_start)
+#define FNZERO(fn_start)
+#endif
+
+#define WAIT_OBJECT_0 ((STATUS_WAIT_0 ) + 0 )
+
+DRIVER_INITIALIZE DriverEntry;
+#pragma alloc_text(INIT, DriverEntry)
+void OnImageLoad(
+ PUNICODE_STRING FullImageName,
+ HANDLE ProcessId,
+ PIMAGE_INFO ImageInfo
+);
+#pragma alloc_text(PAGE, OnImageLoad)
+
+NTSTATUS WaitForControlProcess(OUT PEPROCESS *ppEProcess);
+NTSTATUS VerifyControlProcess(IN PEPROCESS pEProcess);
+NTSTATUS InitSharedMemory(IN PEPROCESS pEProcess);
+NTSTATUS WaitForHandshake(IN PEPROCESS pEProcess,
+ OUT HANDLE *pKEvent, OUT HANDLE *pUEvent);
+NTSTATUS OpenEventReference(IN PEPROCESS pEProcess,
+ IN KAPC_STATE *pKAPCState, IN HANDLE hEvent,
+ OUT PKEVENT *pPKEvent);
+NTSTATUS UpdatePPEPIfRequired(IN HANDLE wantedPID,
+ IN HANDLE lastPID, OUT HANDLE *lastPROC,
+ OUT PEPROCESS *lastPEP);
+NTSTATUS GetPages(IN PEPROCESS Process,
+ OUT MEMORY_BASIC_INFORMATION *mbiArr,
+ IN SIZE_T mbiArrLen, OUT SIZE_T *mbiUsed,
+ IN PVOID start_addr);
+NTSTATUS GetModules(IN PEPROCESS pEProcess,
+ OUT PMODULE_DATA pmod, IN OUT SIZE_T *psiz,
+ IN SIZE_T start_index);
+NTSTATUS KeReadVirtualMemory(IN PEPROCESS pEProcess,
+ IN PVOID SourceAddress,
+ IN PVOID TargetAddress, IN PSIZE_T Size);
+NTSTATUS KeWriteVirtualMemory(IN PEPROCESS pEProcess,
+ IN PVOID SourceAddress,
+ IN PVOID TargetAddress, IN PSIZE_T Size);
+NTSTATUS KeProtectVirtualMemory(IN HANDLE hProcess,
+ IN PVOID addr, IN SIZE_T siz,
+ IN ULONG new_prot, OUT ULONG *old_prot);
+NTSTATUS KeRestoreProtectVirtualMemory(IN HANDLE hProcess,
+ IN PVOID addr, IN SIZE_T siz,
+ IN ULONG old_prot);
+NTSTATUS GetDriverObject(PDRIVER_OBJECT *lpObj, WCHAR* DriverDirName);
+NTSTATUS KRThread(IN PVOID pArg);
+
+#pragma alloc_text(PAGE, WaitForControlProcess)
+#pragma alloc_text(PAGE, VerifyControlProcess)
+#pragma alloc_text(PAGE, InitSharedMemory)
+#pragma alloc_text(PAGE, WaitForHandshake)
+#pragma alloc_text(PAGE, OpenEventReference)
+#pragma alloc_text(PAGE, UpdatePPEPIfRequired)
+#pragma alloc_text(PAGE, GetPages)
+#pragma alloc_text(PAGE, GetModules)
+#pragma alloc_text(PAGE, KeReadVirtualMemory)
+#pragma alloc_text(PAGE, KeWriteVirtualMemory)
+#pragma alloc_text(PAGE, KeProtectVirtualMemory)
+#pragma alloc_text(PAGE, KeRestoreProtectVirtualMemory)
+#pragma alloc_text(PAGE, GetDriverObject)
+#pragma alloc_text(PAGE, KRThread)
+
+static void fn_zero_text(PVOID fn_start);
+static HANDLE ctrlPID;
+static PVOID imageBase;
+
+static PVOID mmapedBase = NULL;
+static INT hijacked = 0;
+static PDRIVER_OBJECT hijackedDriver = NULL;
+static DRIVER_OBJECT hijackedDriverOriginal;
+
+
+NTSTATUS DriverEntry(
+ _In_ DRIVER_OBJECT *DriverObject,
+ _In_ PUNICODE_STRING RegistryPath
+)
+{
+ NTSTATUS status;
+ HANDLE hThread = NULL;
+ CLIENT_ID clientID = { 0 };
+ OBJECT_ATTRIBUTES obAttr = { 0 };
+
+ UNREFERENCED_PARAMETER(DriverObject);
+ UNREFERENCED_PARAMETER(RegistryPath);
+
+ KDBG("Driver Loaded\n");
+ if (!DriverObject && RegistryPath) {
+ /* assume that we are manual mapped by PastDSE */
+ mmapedBase = RegistryPath;
+ KDBG("Manual mapped image base: 0x%p\n", mmapedBase);
+ }
+ InitializeObjectAttributes(&obAttr, NULL, OBJ_KERNEL_HANDLE, NULL, NULL);
+ status = PsCreateSystemThread(&hThread, THREAD_ALL_ACCESS, &obAttr, NULL, &clientID, &KRThread, NULL);
+ if (!NT_SUCCESS(status))
+ {
+ KDBG("Failed to create worker thread. Status: 0x%X\n", status);
+ return status;
+ }
+
+ FNZERO(DriverEntry);
+ return status;
+}
+
+void OnImageLoad(
+ PUNICODE_STRING FullImageName,
+ HANDLE ProcessId,
+ PIMAGE_INFO ImageInfo
+)
+{
+ UNREFERENCED_PARAMETER(ImageInfo);
+#if 0
+ KDBG("ProcessID: 0x%X\n", ProcessId);
+ KDBG("FullImage: %wZ\n", FullImageName);
+#endif
+ if (wcsstr(FullImageName->Buffer, CHEAT_EXE)) {
+ ctrlPID = ProcessId;
+ imageBase = ImageInfo->ImageBase;
+ KDBG("Found Target !!!\n");
+ }
+}
+
+NTSTATUS WaitForControlProcess(OUT PEPROCESS *ppEProcess)
+{
+ NTSTATUS status;
+
+ if (!ppEProcess)
+ return STATUS_INVALID_ADDRESS;
+
+ imageBase = NULL;
+ ctrlPID = NULL;
+
+ status = PsSetLoadImageNotifyRoutine(OnImageLoad);
+ if (!NT_SUCCESS(status)) {
+ KDBG("PsSetLoadImageNotifyRoutine failed with 0x%X\n", status);
+ return status;
+ }
+
+ while (!ctrlPID) {
+ LARGE_INTEGER wait = { .QuadPart = -1000000 };
+ KeDelayExecutionThread(KernelMode, TRUE, &wait);
+ }
+
+ status = PsRemoveLoadImageNotifyRoutine(OnImageLoad);
+ if (!NT_SUCCESS(status)) {
+ KDBG("PsRemoveLoadImageNotifyRoutine failed with 0x%X\n", status);
+ return status;
+ }
+
+ status = PsLookupProcessByProcessId(ctrlPID, ppEProcess);
+ if (!NT_SUCCESS(status)) {
+ KDBG("PsLookupProcessByProcessId failed with 0x%X\n", status);
+ return status;
+ }
+
+ KDBG("Got Ctrl Process PID: 0x%X (%d)\n",
+ ctrlPID, ctrlPID);
+
+ return STATUS_SUCCESS;
+}
+
+NTSTATUS VerifyControlProcess(IN PEPROCESS pEProcess)
+{
+ NTSTATUS status;
+ UCHAR pefile[4] = { 0 };
+ SIZE_T pesiz = sizeof pefile;
+
+ status = KeReadVirtualMemory(pEProcess,
+ imageBase, pefile, &pesiz);
+ if (!NT_SUCCESS(status) || pesiz != sizeof pefile) {
+ KDBG("KeReadVirtualMemory failed with 0x%X\n", status);
+ return status;
+ }
+ if (pefile[0] != 0x4D || pefile[1] != 0x5A ||
+ pefile[2] != 0x90 || pefile[3] != 0x00)
+ {
+ KDBG("Invalid PE file\n");
+ return status;
+ }
+
+ return status;
+}
+
+NTSTATUS InitSharedMemory(IN PEPROCESS pEProcess)
+{
+ NTSTATUS status = STATUS_UNSUCCESSFUL;
+ SIZE_T maxWaits = 20;
+
+ KDBG("Init Shmem ..\n");
+ while (--maxWaits) {
+ UCHAR buf[4] = { 0 };
+ SIZE_T bufsiz = sizeof buf;
+ LARGE_INTEGER wait = { .QuadPart = -5000000 };
+ status = KeReadVirtualMemory(pEProcess,
+ (PVOID)SHMEM_ADDR, buf, &bufsiz);
+ if (NT_SUCCESS(status) && bufsiz == sizeof buf)
+ break;
+ KDBG("Waiting until 0x%X alloc'd by user space app ..\n", SHMEM_ADDR);
+ KeDelayExecutionThread(KernelMode, TRUE, &wait);
+ }
+
+ return status;
+}
+
+NTSTATUS WaitForHandshake(IN PEPROCESS pEProcess,
+ OUT HANDLE *pKEvent, OUT HANDLE *pUEvent)
+{
+ NTSTATUS status = STATUS_UNSUCCESSFUL;
+ SIZE_T maxWaits = 20;
+
+ KDBG("Wait for Handshake ..\n");
+ while (--maxWaits) {
+ KERNEL_HANDSHAKE hnds;
+ SIZE_T siz = sizeof hnds;
+ LARGE_INTEGER wait = { .QuadPart = -5000000 };
+ status = KeReadVirtualMemory(pEProcess, (PVOID)SHMEM_ADDR, &hnds, &siz);
+ if (NT_SUCCESS(status) && siz == sizeof hnds &&
+ hnds.kevent)
+ {
+ if (validateRequest(&hnds) != MEM_HANDSHAKE) {
+ KDBG("Invalid Handshake received: 0x%X\n", hnds.hdr.magic);
+ return STATUS_INVALID_CONNECTION;
+ }
+ *pKEvent = hnds.kevent;
+ *pUEvent = hnds.uevent;
+ KDBG("Got Event Handle 0x%X (Kernel) and 0x%X (User)\n",
+ *pKEvent, *pUEvent);
+ break;
+ }
+ KDBG("Waiting for handshake at 0x%X ..\n", SHMEM_ADDR);
+ KeDelayExecutionThread(KernelMode, TRUE, &wait);
+ }
+
+ return status;
+}
+
+NTSTATUS OpenEventReference(IN PEPROCESS pEProcess,
+ IN KAPC_STATE *pKAPCState, IN HANDLE hEvent,
+ OUT PKEVENT *pPKEvent)
+{
+ NTSTATUS status;
+
+ KeStackAttachProcess((PRKPROCESS)pEProcess, pKAPCState);
+ status = ObReferenceObjectByHandle(
+ hEvent, SYNCHRONIZE | EVENT_MODIFY_STATE,
+ *ExEventObjectType, UserMode, pPKEvent, NULL
+ );
+ KeUnstackDetachProcess(pKAPCState);
+ if (!NT_SUCCESS(status))
+ KDBG("ObReferenceObjectByHandle for Handle 0x%X failed with 0x%X\n",
+ hEvent, status);
+
+ return status;
+}
+
+NTSTATUS KRThread(IN PVOID pArg)
+{
+ NTSTATUS status;
+ INT reinit;
+ HANDLE kevent, uevent;
+ PEPROCESS ctrlPEP;
+ KAPC_STATE apcstate;
+ PKEVENT pk_kevent, pk_uevent;
+
+ UNREFERENCED_PARAMETER(pArg);
+
+ do {
+ reinit = 0;
+ ctrlPEP = NULL;
+ pk_kevent = pk_uevent = NULL;
+
+ KeLowerIrql(0);
+ KDBG("Init ..\n");
+
+ if (mmapedBase && !hijackedDriver &&
+ NT_SUCCESS(GetDriverObject(&hijackedDriver, L"\\Driver\\ahcache")))
+ {
+ if (hijackedDriver) {
+#ifdef _DEBUG_
+ KDBG("Got DriverObject at 0x%p\n", hijackedDriver);
+ PKLDR_DATA_TABLE_ENTRY drv_section = hijackedDriver->DriverSection;
+ KDBG("PDrvObj: base -> 0x%p , name -> '%wZ' , flags -> 0x%X\n",
+ drv_section->DllBase, drv_section->BaseDllName, drv_section->Flags);
+#endif
+ /* !!! EXPERIMENTAL !!! */
+#if 0
+ hijacked = 1;
+ /* the following lines are known to cause a bugcheck */
+ hijackedDriverOriginal = *hijackedDriver;
+ hijackedDriver->DriverStart = mmapedBase;
+ //hijackedDriver->DriverSection = (PVOID)((ULONG_PTR)mmapedBase + 100);
+#endif
+#if 0
+ /* the following lines are known to not work with ahcache driver */
+ hijackedDriver->DriverInit = (PDRIVER_INITIALIZE)DriverEntry;
+ hijackedDriver->DriverStartIo = NULL;
+ hijackedDriver->DriverUnload = NULL;
+ SIZE_T funcs = sizeof hijackedDriver->MajorFunction / sizeof hijackedDriver->MajorFunction[0];
+ for (SIZE_T i = 0; i < funcs; ++i) {
+ hijackedDriver->MajorFunction[i] = NULL;
+ }
+#endif
+ }
+ }
+
+ status = WaitForControlProcess(&ctrlPEP);
+ if (!NT_SUCCESS(status))
+ goto finish;
+
+ if (hijackedDriver && hijacked) {
+ *hijackedDriver = hijackedDriverOriginal;
+ }
+
+ status = VerifyControlProcess(ctrlPEP);
+ if (!NT_SUCCESS(status))
+ goto finish_ctrlpep;
+
+ status = InitSharedMemory(ctrlPEP);
+ if (!NT_SUCCESS(status))
+ goto finish_ctrlpep;
+
+ status = WaitForHandshake(ctrlPEP,
+ &kevent, &uevent);
+ if (!NT_SUCCESS(status))
+ goto finish_ctrlpep;
+
+ status = OpenEventReference(ctrlPEP,
+ &apcstate, kevent, &pk_kevent);
+ if (!NT_SUCCESS(status))
+ goto finish_ctrlpep;
+
+ status = OpenEventReference(ctrlPEP,
+ &apcstate, uevent, &pk_uevent);
+ if (!NT_SUCCESS(status))
+ goto finish_kevent;
+
+ KeClearEvent(pk_kevent);
+ KeClearEvent(pk_uevent);
+
+ PVOID shm_buf = MmAllocateNonCachedMemory(SHMEM_SIZE);
+ if (!shm_buf) {
+ KDBG("MmAllocateNonCachedMemory with size 0x%X failed\n", SHMEM_SIZE);
+ goto nomem;
+ }
+
+ reinit = 1;
+ KeSetEvent(pk_uevent, FILE_DEVICE_MOUSE, TRUE);
+ HANDLE lastPID = NULL, lastPROC = NULL;
+ PEPROCESS lastPEP = NULL;
+ INT running = 1;
+ SIZE_T maxWaits = 20;
+ do {
+ LARGE_INTEGER wait = { .QuadPart = -10000000 };
+ status = KeWaitForSingleObject(pk_kevent, Executive, UserMode, FALSE, &wait);
+ if (NT_SUCCESS(status) && status == WAIT_OBJECT_0) {
+ maxWaits = 20;
+ /* parse memory request */
+ SIZE_T siz = SHMEM_SIZE;
+ status = KeReadVirtualMemory(ctrlPEP, (PVOID)SHMEM_ADDR, shm_buf, &siz);
+
+ if (NT_SUCCESS(status) && siz == SHMEM_SIZE) {
+ switch (validateRequest(shm_buf))
+ {
+ case MEM_HANDSHAKE:
+ KDBG("Invalid Request MEM_HANDSHAKE\n");
+ break;
+ case MEM_PING: {
+ PKERNEL_PING ping = (PKERNEL_PING)shm_buf;
+ KDBG("Got a PING with rng 0x%X, sending PONG !\n",
+ ping->rnd_user);
+ ping->rnd_kern = ping->rnd_user;
+ siz = sizeof *ping;
+ KeWriteVirtualMemory(ctrlPEP, ping, (PVOID)SHMEM_ADDR, &siz);
+ break;
+ }
+ case MEM_PAGES: {
+ PKERNEL_PAGE pages = (PKERNEL_PAGE)shm_buf;
+ KDBG("Got a PAGES request for process 0x%X start at address 0x%p\n",
+ pages->ProcessId, pages->StartAddress);
+ if (!NT_SUCCESS(UpdatePPEPIfRequired(pages->ProcessId,
+ lastPID, &lastPROC, &lastPEP)))
+ {
+ running = 0;
+ break;
+ }
+ siz = (SHMEM_SIZE - sizeof *pages + sizeof pages->pages_start)
+ / sizeof pages->pages_start;
+ pages->StatusRes = GetPages(lastPEP, &pages->pages_start, siz,
+ &pages->pages, pages->StartAddress);
+ siz = (sizeof *pages - sizeof pages->pages_start) +
+ sizeof pages->pages_start * pages->pages;
+ KeWriteVirtualMemory(ctrlPEP, pages, (PVOID)SHMEM_ADDR, &siz);
+ break;
+ }
+ case MEM_MODULES: {
+ PKERNEL_MODULES mods = (PKERNEL_MODULES)shm_buf;
+ KDBG("Got a MODULES request for process 0x%X start at index 0x%X\n",
+ mods->ProcessId, mods->StartIndex);
+ if (!NT_SUCCESS(UpdatePPEPIfRequired(mods->ProcessId,
+ lastPID, &lastPROC, &lastPEP)))
+ {
+ running = 0;
+ break;
+ }
+ siz = (SHMEM_SIZE - sizeof *mods + sizeof mods->modules_start)
+ / sizeof mods->modules_start;
+ PMODULE_DATA entries = &mods->modules_start;
+ KDBG("GetModules max entries: %u\n", siz);
+ KeStackAttachProcess((PRKPROCESS)lastPEP, &apcstate);
+ mods->StatusRes = GetModules(lastPEP, entries, &siz, mods->StartIndex);
+ KeUnstackDetachProcess(&apcstate);
+ mods->modules = siz;
+ siz = (sizeof *mods - sizeof mods->modules_start) +
+ sizeof mods->modules_start * mods->modules;
+ KeWriteVirtualMemory(ctrlPEP, mods, (PVOID)SHMEM_ADDR, &siz);
+ break;
+ }
+ case MEM_RPM: {
+ PKERNEL_READ_REQUEST rr = (PKERNEL_READ_REQUEST)shm_buf;
+ KDBG("Got a RPM to process 0x%X, address 0x%p with size 0x%lX\n",
+ rr->ProcessId, rr->Address, rr->SizeReq);
+ if (!NT_SUCCESS(UpdatePPEPIfRequired(rr->ProcessId,
+ lastPID, &lastPROC, &lastPEP)))
+ {
+ running = 0;
+ break;
+ }
+ if (rr->SizeReq > SHMEM_SIZE - sizeof *rr) {
+ siz = SHMEM_SIZE - sizeof *rr;
+ }
+ else {
+ siz = rr->SizeReq;
+ }
+ ULONG new_prot = PAGE_EXECUTE_READWRITE, old_prot = 0;
+ KeProtectVirtualMemory(lastPROC, rr->Address, rr->SizeReq, new_prot, &old_prot);
+ KDBG("RPM to 0x%p size 0x%X bytes (protection before/after: 0x%X/0x%X)\n",
+ rr->Address, rr->SizeReq, old_prot, new_prot);
+ rr->StatusRes = KeReadVirtualMemory(lastPEP, (PVOID)rr->Address,
+ (PVOID)((ULONG_PTR)shm_buf + sizeof *rr), &siz);
+ KeRestoreProtectVirtualMemory(lastPROC, rr->Address, rr->SizeReq, old_prot);
+ if (NT_SUCCESS(rr->StatusRes)) {
+ rr->SizeRes = siz;
+ siz += sizeof *rr;
+ }
+ else {
+ rr->SizeRes = 0;
+ siz = sizeof *rr;
+ }
+ KeWriteVirtualMemory(ctrlPEP, rr, (PVOID)SHMEM_ADDR, &siz);
+ break;
+ }
+ case MEM_WPM: {
+ PKERNEL_WRITE_REQUEST wr = (PKERNEL_WRITE_REQUEST)shm_buf;
+ KDBG("Got a WPM to process 0x%X, address 0x%p with size 0x%lX\n",
+ wr->ProcessId, wr->Address, wr->SizeReq);
+ if (!NT_SUCCESS(UpdatePPEPIfRequired(wr->ProcessId,
+ lastPID, &lastPROC, &lastPEP)))
+ {
+ running = 0;
+ break;
+ }
+ if (wr->SizeReq > SHMEM_SIZE - sizeof *wr) {
+ siz = SHMEM_SIZE - sizeof *wr;
+ }
+ else {
+ siz = wr->SizeReq;
+ }
+ ULONG new_prot = PAGE_EXECUTE_READWRITE, old_prot = 0;
+ KeProtectVirtualMemory(lastPEP, wr->Address, wr->SizeReq, new_prot, &old_prot);
+ KDBG("WPM to 0x%p size 0x%X bytes (protection before/after: 0x%X/0x%X)\n",
+ wr->Address, wr->SizeReq, old_prot, new_prot);
+ wr->StatusRes = KeWriteVirtualMemory(lastPEP, (PVOID)((ULONG_PTR)shm_buf + sizeof *wr),
+ (PVOID)wr->Address, &siz);
+ KeRestoreProtectVirtualMemory(lastPROC, wr->Address, wr->SizeReq, old_prot);
+ if (NT_SUCCESS(wr->StatusRes)) {
+ wr->SizeRes = siz;
+ siz += sizeof *wr;
+ }
+ else {
+ wr->SizeRes = 0;
+ siz = sizeof *wr;
+ }
+ KeWriteVirtualMemory(ctrlPEP, wr, (PVOID)SHMEM_ADDR, &siz);
+ break;
+ }
+ case MEM_EXIT:
+ KDBG("Gracefully exiting ..\n");
+ KeClearEvent(pk_kevent);
+ KeClearEvent(pk_uevent);
+ running = 0;
+ reinit = 0;
+ break;
+ default:
+ KDBG("Invalid Request\n");
+ running = 0;
+ reinit = 0;
+ break;
+ }
+ }
+
+ if (KeSetEvent(pk_uevent, FILE_DEVICE_MOUSE, TRUE)) {
+ KDBG("Previous signal state wasn't consumed!?\n");
+ }
+ }
+ else {
+ if (!maxWaits--) {
+ KDBG("No activity, abort ..\n");
+ running = 0;
+ }
+ }
+ } while (running);
+ KeSetEvent(pk_uevent, FILE_DEVICE_MOUSE, TRUE);
+
+ if (lastPEP)
+ ObDereferenceObject(lastPEP);
+ if (lastPROC)
+ ZwClose(lastPROC);
+ MmFreeNonCachedMemory(shm_buf, SHMEM_SIZE);
+ nomem:
+ ObDereferenceObject(pk_uevent);
+ finish_kevent:
+ ObDereferenceObject(pk_kevent);
+ finish_ctrlpep:
+ ObDereferenceObject(ctrlPEP);
+ finish:
+ if (reinit) {
+ LARGE_INTEGER wait = { .QuadPart = -50000000 };
+ KeDelayExecutionThread(KernelMode, TRUE, &wait);
+ }
+ } while (reinit);
+
+ KDBG("Terminating ..\n");
+ PsTerminateSystemThread(status);
+ return status;
+}
+
+NTSTATUS UpdatePPEPIfRequired(IN HANDLE wantedPID,
+ IN HANDLE lastPID, OUT HANDLE *lastPROC,
+ OUT PEPROCESS *lastPEP)
+{
+ NTSTATUS status = STATUS_SUCCESS;
+
+ if (wantedPID != lastPID) {
+ if (lastPID) {
+ ObDereferenceObject(*lastPEP);
+ *lastPEP = NULL;
+ ZwClose(*lastPROC);
+ *lastPROC = NULL;
+ }
+ status = PsLookupProcessByProcessId(wantedPID, lastPEP);
+ if (!NT_SUCCESS(status)) {
+ KDBG("PsLookupProcessByProcessId failed with 0x%X\n", status);
+ }
+ else {
+ status = ObOpenObjectByPointer(*lastPEP,
+ OBJ_KERNEL_HANDLE | OBJ_CASE_INSENSITIVE, NULL, GENERIC_ALL,
+ *PsProcessType, KernelMode, lastPROC
+ );
+ if (!NT_SUCCESS(status)) {
+ KDBG("ObOpenObjectByPointer failed with 0x%X\n", status);
+ }
+ }
+ }
+ return status;
+}
+
+NTSTATUS GetPages(IN PEPROCESS Process,
+ OUT MEMORY_BASIC_INFORMATION *mbiArr,
+ IN SIZE_T mbiArrLen, OUT SIZE_T *mbiUsed,
+ IN PVOID start_addr)
+{
+ NTSTATUS status;
+ HANDLE procHandle;
+ SIZE_T i, mbiLength, mbiReturn;
+ ULONG_PTR baseAddr = (ULONG_PTR)start_addr;
+
+ status = ObOpenObjectByPointer(Process,
+ OBJ_KERNEL_HANDLE | OBJ_CASE_INSENSITIVE, NULL, GENERIC_ALL,
+ *PsProcessType, KernelMode, &procHandle
+ );
+ if (!NT_SUCCESS(status)) {
+ KDBG("ObOpenObjectByPointer failed with 0x%X\n", status);
+ return status;
+ }
+
+ KDBG("ZwQueryVirtualMemory max entries: %u\n", mbiArrLen);
+ *mbiUsed = 0;
+ do {
+ mbiReturn = 0;
+ status = ZwQueryVirtualMemory(procHandle, (PVOID)baseAddr,
+ MemoryBasicInformation, mbiArr, sizeof *mbiArr * mbiArrLen, &mbiReturn);
+ mbiLength = mbiReturn / sizeof *mbiArr;
+ if (!NT_SUCCESS(status)) {
+ if (status == STATUS_INVALID_PARAMETER)
+ status = STATUS_SUCCESS;
+ else
+ KDBG("ZwQueryVirtualMemory failed with 0x%X\n", status);
+ break;
+ }
+ else {
+ for (i = 0; i < mbiLength; ++i)
+ KDBG("Page #%03u: base -> %p, prot -> 0x%02X, size -> 0x%X\n",
+ (*mbiUsed) + i, (*(mbiArr + i)).BaseAddress, (*(mbiArr + i)).Protect,
+ (*(mbiArr + i)).RegionSize);
+ }
+ baseAddr += (SIZE_T)(mbiArr + mbiLength - 1)->RegionSize;
+ *mbiUsed += mbiLength;
+ mbiArr += mbiLength;
+ } while (*mbiUsed < mbiArrLen && mbiReturn > 0);
+
+ ZwClose(procHandle);
+ return status;
+}
+
+NTSTATUS GetModules(IN PEPROCESS Process,
+ OUT PMODULE_DATA pmod, IN OUT SIZE_T *psiz,
+ IN SIZE_T start_index)
+{
+ SIZE_T used = 0, index = 0;
+ INT waitCount = 0;
+
+ PPEB peb = PsGetProcessPeb(Process);
+ if (!peb) {
+ KDBG("PsGetProcessPeb failed");
+ return STATUS_UNSUCCESSFUL;
+ }
+
+ PPEB_LDR_DATA ldr = peb->Ldr;
+
+ if (!ldr) {
+ KDBG("peb->Ldr is invalid");
+ return STATUS_UNSUCCESSFUL;
+ }
+
+ if (!ldr->Initialized) {
+ while (!ldr->Initialized && waitCount++ < 4) {
+ LARGE_INTEGER wait = { .QuadPart = -2500 };
+ KeDelayExecutionThread(KernelMode, TRUE, &wait);
+ }
+
+ if (!ldr->Initialized) {
+ KDBG("ldr->Initialized is 0");
+ return STATUS_UNSUCCESSFUL;
+ }
+ }
+
+ for (PLIST_ENTRY listEntry = (PLIST_ENTRY)ldr->InLoadOrderModuleList.Flink;
+ listEntry != &ldr->InLoadOrderModuleList && used < *psiz;
+ listEntry = (PLIST_ENTRY)listEntry->Flink, ++pmod, ++index) {
+ if (index < start_index)
+ continue;
+ used++;
+
+ PLDR_DATA_TABLE_ENTRY ldrEntry = CONTAINING_RECORD(listEntry, LDR_DATA_TABLE_ENTRY, InLoadOrderLinks);
+ ANSI_STRING name;
+ if (NT_SUCCESS(RtlUnicodeStringToAnsiString(&name, &ldrEntry->BaseDllName, sizeof pmod->BaseDllName))) {
+ RtlCopyMemory(pmod->BaseDllName, name.Buffer,
+ (name.Length > sizeof pmod->BaseDllName ?
+ sizeof pmod->BaseDllName : name.Length)
+ );
+ }
+ pmod->DllBase = ldrEntry->DllBase;
+ pmod->SizeOfImage = ldrEntry->SizeOfImage;
+ KDBG("DLL #%02lu: base -> 0x%p, size -> 0x%06X, name -> '%s'\n", used,
+ pmod->DllBase, pmod->SizeOfImage, pmod->BaseDllName);
+ }
+
+ *psiz = used;
+ return STATUS_SUCCESS;
+}
+
+NTSTATUS KeReadVirtualMemory(IN PEPROCESS Process,
+ IN PVOID SourceAddress,
+ IN PVOID TargetAddress, IN PSIZE_T Size)
+{
+ NTSTATUS status;
+ SIZE_T Bytes = 0;
+
+ status = MmCopyVirtualMemory(Process, SourceAddress, PsGetCurrentProcess(),
+ TargetAddress, *Size, KernelMode, &Bytes);
+ if (NT_SUCCESS(status))
+ {
+ *Size = Bytes;
+ return STATUS_SUCCESS;
+ }
+ else {
+ return status;
+ }
+}
+
+NTSTATUS KeWriteVirtualMemory(IN PEPROCESS Process,
+ IN PVOID SourceAddress,
+ IN PVOID TargetAddress, IN PSIZE_T Size)
+{
+ NTSTATUS status;
+ SIZE_T Bytes = 0;
+
+ status = MmCopyVirtualMemory(PsGetCurrentProcess(), SourceAddress, Process,
+ TargetAddress, *Size, KernelMode, &Bytes);
+ if (NT_SUCCESS(status))
+ {
+ *Size = Bytes;
+ return STATUS_SUCCESS;
+ }
+ else {
+ return status;
+ }
+}
+
+NTSTATUS KeProtectVirtualMemory(IN HANDLE hProcess,
+ IN PVOID addr, IN SIZE_T siz, IN ULONG new_prot,
+ OUT ULONG *old_prot)
+{
+ NTSTATUS status;
+ PVOID prot_addr = addr;
+ SIZE_T prot_size = siz;
+ ULONG prot = 0;
+
+ status = ZwProtectVirtualMemory(hProcess, &prot_addr,
+ &prot_size, new_prot, &prot);
+ if (NT_SUCCESS(status)) {
+ *old_prot = prot;
+ }
+ return status;
+}
+
+NTSTATUS KeRestoreProtectVirtualMemory(IN HANDLE hProcess,
+ IN PVOID addr, IN SIZE_T siz,
+ IN ULONG old_prot)
+{
+ NTSTATUS status;
+ PVOID prot_addr = addr;
+ SIZE_T prot_size = siz;
+ ULONG prot = 0;
+
+ status = ZwProtectVirtualMemory(hProcess, &prot_addr,
+ &prot_size, old_prot, &prot);
+ return status;
+}
+
+static void fn_zero_text(PVOID fn_start)
+{
+ SIZE_T i;
+ UINT32 marker = 0xDEADC0DE;
+ PUCHAR fnbuf = (PUCHAR)fn_start;
+
+ KDBG("Fn: %p\n", fn_start);
+ for (i = 0; i < 0x1000; ++i && fnbuf++) {
+ if (*(UINT32 *)fnbuf == marker) {
+ KDBG("Marker: 0x%X\n", i);
+ RtlSecureZeroMemory(fn_start, i + 4);
+ }
+ }
+}
+
+NTSTATUS GetDriverObject(PDRIVER_OBJECT *lpObj, WCHAR* DriverDirName)
+{
+ NTSTATUS status = STATUS_SUCCESS;
+ PDRIVER_OBJECT pBeepObj = NULL;
+ UNICODE_STRING DevName = { 0 };
+
+ if (!MmIsAddressValid(lpObj))
+ return STATUS_INVALID_ADDRESS;
+
+ RtlInitUnicodeString(&DevName, DriverDirName);
+
+ status = ObReferenceObjectByName(&DevName, OBJ_CASE_INSENSITIVE, NULL, 0, *IoDriverObjectType, KernelMode, NULL, &pBeepObj);
+
+ if (NT_SUCCESS(status))
+ *lpObj = pBeepObj;
+ else
+ {
+ *lpObj = NULL;
+ }
+
+ return status;
+} \ No newline at end of file
diff --git a/KMemDriver/Imports.h b/KMemDriver/Imports.h
new file mode 100644
index 0000000..44f53cc
--- /dev/null
+++ b/KMemDriver/Imports.h
@@ -0,0 +1,112 @@
+#pragma once
+
+#include <ntddk.h>
+#include <wdm.h>
+
+
+extern POBJECT_TYPE* IoDriverObjectType;
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+MmCopyVirtualMemory
+(
+ PEPROCESS SourceProcess,
+ PVOID SourceAddress,
+ PEPROCESS TargetProcess,
+ PVOID TargetAddress,
+ SIZE_T BufferSize,
+ KPROCESSOR_MODE PreviousMode,
+ PSIZE_T ReturnSize
+);
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+PsLookupProcessByProcessId(
+ _In_ HANDLE ProcessId,
+ _Outptr_ PEPROCESS *Process
+);
+
+typedef struct _KAPC_STATE
+{
+ LIST_ENTRY ApcListHead[2];
+ PKPROCESS Process;
+ UCHAR KernelApcInProgress;
+ UCHAR KernelApcPending;
+ UCHAR UserApcPending;
+} KAPC_STATE, *PKAPC_STATE, *PRKAPC_STATE;
+
+NTKERNELAPI
+VOID
+NTAPI
+KeStackAttachProcess(
+ PRKPROCESS PROCESS,
+ PRKAPC_STATE ApcState
+);
+
+NTKERNELAPI
+VOID
+NTAPI
+KeUnstackDetachProcess(
+ PRKAPC_STATE ApcState
+);
+
+NTKERNELAPI
+PPEB
+NTAPI
+PsGetProcessPeb(PEPROCESS Process);
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+ObOpenObjectByPointer(
+ PVOID Object,
+ ULONG HandleAttributes,
+ PACCESS_STATE PassedAccessState,
+ ACCESS_MASK DesiredAccess,
+ POBJECT_TYPE ObjectType,
+ KPROCESSOR_MODE AccessMode,
+ PHANDLE Handle
+);
+
+typedef enum _MEMORY_INFORMATION_CLASS {
+ MemoryBasicInformation
+} MEMORY_INFORMATION_CLASS;
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+ZwQueryVirtualMemory(
+ _In_ HANDLE ProcessHandle,
+ _In_opt_ PVOID BaseAddress,
+ _In_ MEMORY_INFORMATION_CLASS MemoryInformationClass,
+ _Out_ PVOID MemoryInformation,
+ _In_ SIZE_T MemoryInformationLength,
+ _Out_opt_ PSIZE_T ReturnLength
+);
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+ZwProtectVirtualMemory(
+ IN HANDLE ProcessHandle,
+ IN PVOID* BaseAddress, /* THIS IS ACTUALLY AN IN_OUT */
+ IN SIZE_T* NumberOfBytesToProtect,
+ IN ULONG NewAccessProtection,
+ OUT PULONG OldAccessProtection
+);
+
+NTKERNELAPI
+NTSTATUS
+NTAPI
+ObReferenceObjectByName(
+ PUNICODE_STRING ObjectName,
+ ULONG Attributes,
+ PACCESS_STATE Passed,
+ ACCESS_MASK DesiredAccess,
+ POBJECT_TYPE ObjectType,
+ KPROCESSOR_MODE Access,
+ PVOID ParseContext,
+ PVOID* ObjectPtr
+); \ No newline at end of file
diff --git a/KMemDriver/KMemDriver.vcxproj b/KMemDriver/KMemDriver.vcxproj
new file mode 100644
index 0000000..1c84ef0
--- /dev/null
+++ b/KMemDriver/KMemDriver.vcxproj
@@ -0,0 +1,185 @@
+<?xml version="1.0" encoding="utf-8"?>
+<Project DefaultTargets="Build" ToolsVersion="12.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
+ <ItemGroup Label="ProjectConfigurations">
+ <ProjectConfiguration Include="Debug|Win32">
+ <Configuration>Debug</Configuration>
+ <Platform>Win32</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Release|Win32">
+ <Configuration>Release</Configuration>
+ <Platform>Win32</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Debug|x64">
+ <Configuration>Debug</Configuration>
+ <Platform>x64</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Release|x64">
+ <Configuration>Release</Configuration>
+ <Platform>x64</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Debug|ARM">
+ <Configuration>Debug</Configuration>
+ <Platform>ARM</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Release|ARM">
+ <Configuration>Release</Configuration>
+ <Platform>ARM</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Debug|ARM64">
+ <Configuration>Debug</Configuration>
+ <Platform>ARM64</Platform>
+ </ProjectConfiguration>
+ <ProjectConfiguration Include="Release|ARM64">
+ <Configuration>Release</Configuration>
+ <Platform>ARM64</Platform>
+ </ProjectConfiguration>
+ </ItemGroup>
+ <PropertyGroup Label="Globals">
+ <ProjectGuid>{5B65BD0E-C43C-41E3-A016-1CD0B092998F}</ProjectGuid>
+ <TemplateGuid>{1bc93793-694f-48fe-9372-81e2b05556fd}</TemplateGuid>
+ <TargetFrameworkVersion>v4.5</TargetFrameworkVersion>
+ <MinimumVisualStudioVersion>12.0</MinimumVisualStudioVersion>
+ <Configuration>Debug</Configuration>
+ <Platform Condition="'$(Platform)' == ''">Win32</Platform>
+ <RootNamespace>KMemDriver</RootNamespace>
+ <ProjectName>KMemDriver</ProjectName>
+ </PropertyGroup>
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.Default.props" />
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>true</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ <SpectreMitigation>false</SpectreMitigation>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>false</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ <SpectreMitigation>false</SpectreMitigation>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>true</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ <SpectreMitigation>false</SpectreMitigation>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>false</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ <SpectreMitigation>false</SpectreMitigation>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|ARM'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>true</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|ARM'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>false</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|ARM64'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>true</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|ARM64'" Label="Configuration">
+ <TargetVersion>Windows10</TargetVersion>
+ <UseDebugLibraries>false</UseDebugLibraries>
+ <PlatformToolset>WindowsKernelModeDriver10.0</PlatformToolset>
+ <ConfigurationType>Driver</ConfigurationType>
+ <DriverType>KMDF</DriverType>
+ <DriverTargetPlatform>Universal</DriverTargetPlatform>
+ </PropertyGroup>
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.props" />
+ <ImportGroup Label="ExtensionSettings">
+ </ImportGroup>
+ <ImportGroup Label="PropertySheets">
+ <Import Project="$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props" Condition="exists('$(UserRootDir)\Microsoft.Cpp.$(Platform).user.props')" Label="LocalAppDataPlatform" />
+ </ImportGroup>
+ <PropertyGroup Label="UserMacros" />
+ <PropertyGroup />
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|ARM'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|ARM'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|ARM64'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|ARM64'">
+ <DebuggerFlavor>DbgengKernelDebugger</DebuggerFlavor>
+ </PropertyGroup>
+ <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|Win32'">
+ <ClCompile>
+ <PreprocessorDefinitions>_DEBUG_;%(PreprocessorDefinitions)</PreprocessorDefinitions>
+ </ClCompile>
+ </ItemDefinitionGroup>
+ <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
+ <ClCompile>
+ <PreprocessorDefinitions>_DEBUG_;%(PreprocessorDefinitions)</PreprocessorDefinitions>
+ </ClCompile>
+ </ItemDefinitionGroup>
+ <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">
+ <ClCompile>
+ <PreprocessorDefinitions>KERNEL_MODULE;_DEBUG_;%(PreprocessorDefinitions)</PreprocessorDefinitions>
+ <AdditionalIncludeDirectories>$(SolutionDir)include;$(SolutionDir)$(SolutionName);%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
+ </ClCompile>
+ </ItemDefinitionGroup>
+ <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
+ <ClCompile />
+ <ClCompile>
+ <AdditionalIncludeDirectories>$(SolutionDir)include;$(SolutionDir)$(SolutionName);%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
+ <PreprocessorDefinitions>KERNEL_MODULE;%(PreprocessorDefinitions)</PreprocessorDefinitions>
+ </ClCompile>
+ </ItemDefinitionGroup>
+ <ItemGroup>
+ <FilesToPackage Include="$(TargetPath)" />
+ </ItemGroup>
+ <ItemGroup>
+ <ClCompile Include="Driver.c" />
+ </ItemGroup>
+ <ItemGroup>
+ <ClInclude Include="..\include\Driver.h" />
+ <ClInclude Include="Imports.h" />
+ <ClInclude Include="Native.h" />
+ </ItemGroup>
+ <Import Project="$(VCTargetsPath)\Microsoft.Cpp.targets" />
+ <ImportGroup Label="ExtensionTargets">
+ </ImportGroup>
+</Project> \ No newline at end of file
diff --git a/KMemDriver/KMemDriver.vcxproj.filters b/KMemDriver/KMemDriver.vcxproj.filters
new file mode 100644
index 0000000..99f5bcc
--- /dev/null
+++ b/KMemDriver/KMemDriver.vcxproj.filters
@@ -0,0 +1,29 @@
+<?xml version="1.0" encoding="utf-8"?>
+<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
+ <ItemGroup>
+ <Filter Include="Source Files">
+ <UniqueIdentifier>{4FC737F1-C7A5-4376-A066-2A32D752A2FF}</UniqueIdentifier>
+ <Extensions>cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx</Extensions>
+ </Filter>
+ <Filter Include="Header Files">
+ <UniqueIdentifier>{93995380-89BD-4b04-88EB-625FBE52EBFB}</UniqueIdentifier>
+ <Extensions>h;hpp;hxx;hm;inl;inc;xsd</Extensions>
+ </Filter>
+ </ItemGroup>
+ <ItemGroup>
+ <ClCompile Include="Driver.c">
+ <Filter>Source Files</Filter>
+ </ClCompile>
+ </ItemGroup>
+ <ItemGroup>
+ <ClInclude Include="Imports.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="Native.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ <ClInclude Include="..\include\Driver.h">
+ <Filter>Header Files</Filter>
+ </ClInclude>
+ </ItemGroup>
+</Project> \ No newline at end of file
diff --git a/KMemDriver/Native.h b/KMemDriver/Native.h
new file mode 100644
index 0000000..e421bda
--- /dev/null
+++ b/KMemDriver/Native.h
@@ -0,0 +1,82 @@
+#pragma once
+
+#include <ntddk.h>
+
+typedef struct _PEB_LDR_DATA
+{
+ ULONG Length;
+ UCHAR Initialized;
+ PVOID SsHandle;
+ LIST_ENTRY InLoadOrderModuleList;
+ LIST_ENTRY InMemoryOrderModuleList;
+ LIST_ENTRY InInitializationOrderModuleList;
+} PEB_LDR_DATA, *PPEB_LDR_DATA;
+
+typedef struct _LDR_DATA_TABLE_ENTRY
+{
+ LIST_ENTRY InLoadOrderLinks;
+ LIST_ENTRY InMemoryOrderLinks;
+ LIST_ENTRY InInitializationOrderLinks;
+ PVOID DllBase;
+ PVOID EntryPoint;
+ ULONG SizeOfImage;
+ UNICODE_STRING FullDllName;
+ UNICODE_STRING BaseDllName;
+ ULONG Flags;
+ USHORT LoadCount;
+ USHORT TlsIndex;
+ LIST_ENTRY HashLinks;
+ ULONG TimeDateStamp;
+} LDR_DATA_TABLE_ENTRY, *PLDR_DATA_TABLE_ENTRY;
+
+typedef struct _PEB
+{
+ UCHAR InheritedAddressSpace;
+ UCHAR ReadImageFileExecOptions;
+ UCHAR BeingDebugged;
+ UCHAR BitField;
+ PVOID Mutant;
+ PVOID ImageBaseAddress;
+ PPEB_LDR_DATA Ldr;
+ PVOID ProcessParameters;
+ PVOID SubSystemData;
+ PVOID ProcessHeap;
+ PVOID FastPebLock;
+ PVOID AtlThunkSListPtr;
+ PVOID IFEOKey;
+ PVOID CrossProcessFlags;
+ PVOID KernelCallbackTable;
+ ULONG SystemReserved;
+ ULONG AtlThunkSListPtr32;
+ PVOID ApiSetMap;
+} PEB, *PPEB;
+
+typedef struct _MEMORY_BASIC_INFORMATION {
+ PVOID BaseAddress;
+ PVOID AllocationBase;
+ ULONG AllocationProtect;
+ SIZE_T RegionSize;
+ ULONG State;
+ ULONG Protect;
+ ULONG Type;
+} MEMORY_BASIC_INFORMATION, *PMEMORY_BASIC_INFORMATION;
+
+typedef struct _KLDR_DATA_TABLE_ENTRY {
+ LIST_ENTRY InLoadOrderLinks;
+ PVOID ExceptionTable;
+ ULONG ExceptionTableSize;
+ PVOID GpValue;
+ PVOID NonPagedDebugInfo;
+ PVOID DllBase;
+ PVOID EntryPoint;
+ ULONG SizeOfImage;
+ UNICODE_STRING FullDllName;
+ UNICODE_STRING BaseDllName;
+ ULONG Flags;
+ USHORT LoadCount;
+ USHORT __Unused;
+ PVOID SectionPointer;
+ ULONG CheckSum;
+ PVOID LoadedImports;
+ PVOID PatchInformation;
+} KLDR_DATA_TABLE_ENTRY, *PKLDR_DATA_TABLE_ENTRY; \ No newline at end of file