ScyllaHide icon indicating copy to clipboard operation
ScyllaHide copied to clipboard

DetourCreateRemote->ReadProcessMemory failed. (3)

Open ArturAlekseev opened this issue 1 year ago • 2 comments

I have this error now (version 1.4). Using latest x64dbg.

  1. Select Themida profile.
  2. Run target and get error at start. In logs: ERROR: Failed to write hook dll data

It only happens when any of these options enabled: NtUserFindWindowEx NtUserBuildHwndList NtUserQueryWindow NtUserGetForegroundWindow

It happens at:

ReadProcessMemory(hProcess, lpFuncOrig, originalBytes, sizeof(originalBytes), nullptr) in DetourCreateRemote (InjectorCLI).

Params: hProcess = 934 lpFuncOrig = 0x000002876e642180 (in win32u.dll address)

In target 0x000002876e642180 address is not initialized. The address in target is 00007FF847802180 (NtUserFindWindowEx).

It is because win32u.dll base address in x64dbg process is different (2876E640000) and in target win32u.dll base is "normal" (7FF847800000).

The error happens because user dll VAs are got using GetProcessAddress from host process (in my case x64dbg process). But injection is done into target process (program loaded by x64dbg) where win32u.dll has different base address. If accidently in same case target process will have same address initialized (but not with win32u.dll) then injection will happen not into win32u.dll functions, resulting in unknown buggy behavior.

ArturAlekseev avatar Sep 10 '23 09:09 ArturAlekseev

same problem while use Themida profile

scanleale avatar Jan 02 '24 09:01 scanleale

same problem while use Themida profile

You can download build from my fork.

ArturAlekseev avatar Jan 11 '24 20:01 ArturAlekseev