@@ -19,7 +19,7 @@ using _cef_urlrequest_create = cef_urlrequest_t * (*)(struct _cef_request_t* req
19
19
20
20
static _cef_urlrequest_create cef_urlrequest_create_orig;
21
21
22
- static constexpr std::array<std::string_view, 3> blockList = { "/ads/", "/ad-logic/", "/gabo-receiver-service/" };
22
+ static constexpr std::array<std::string_view, 3> block_list = { "/ads/", "/ad-logic/", "/gabo-receiver-service/" };
23
23
24
24
cef_urlrequest_t* cef_urlrequest_create_hook (struct _cef_request_t* request,
25
25
struct _cef_urlrequest_client_t* client,
@@ -40,7 +40,7 @@ cef_urlrequest_t* cef_urlrequest_create_hook (struct _cef_request_t* request,
40
40
delete[] c_url;
41
41
cef_string_userfree_utf16_free (url_utf16);
42
42
43
- for (auto blockurl : blockList ) {
43
+ for (const auto& blockurl : block_list ) {
44
44
if (std::string::npos != url.find (blockurl)) {
45
45
g_Logger.Log ("blocked - " + url);
46
46
return nullptr;
@@ -103,6 +103,23 @@ DWORD WINAPI KillBanner (LPVOID)
103
103
}
104
104
else {
105
105
g_Logger.Log (" main process - patch failed!" );
106
+
107
+ skipPod = FindPattern ((uint8_t *)hModule, mInfo .SizeOfImage , (BYTE*)" \x83\xC4\x08\x84\xC0\x0F\x84\xED\x03\x00\x00 " , " xxxxxxxxxxx" );
108
+ if (skipPod)
109
+ {
110
+ DWORD oldProtect;
111
+ VirtualProtect ((char *)skipPod + 5 , 1 , PAGE_EXECUTE_READWRITE, &oldProtect);
112
+ memset ((char *)skipPod + 5 , 0x90 , 1 );
113
+ VirtualProtect ((char *)skipPod + 5 , 1 , oldProtect, &oldProtect);
114
+
115
+ VirtualProtect ((char *)skipPod + 6 , 1 , PAGE_EXECUTE_READWRITE, &oldProtect);
116
+ memset ((char *)skipPod + 6 , 0xE9 , 1 );
117
+ VirtualProtect ((char *)skipPod + 6 , 1 , oldProtect, &oldProtect);
118
+ g_Logger.Log (" main process 1.1.66.578.gc54d0f69-a - patch success!" );
119
+ }
120
+ else {
121
+ g_Logger.Log (" main process 1.1.66.578.gc54d0f69-a - patch failed!" );
122
+ }
106
123
}
107
124
108
125
}
0 commit comments