Skip to content

DetourCreateRemote->ReadProcessMemory failed. (3) #157

Open
@ArturAlekseev

Description

@ArturAlekseev

I have this error now (version 1.4). Using latest x64dbg.

  1. Select Themida profile.
  2. Run target and get error at start.
    In logs:
    ERROR: Failed to write hook dll data

It only happens when any of these options enabled:
NtUserFindWindowEx
NtUserBuildHwndList
NtUserQueryWindow
NtUserGetForegroundWindow

It happens at:

ReadProcessMemory(hProcess, lpFuncOrig, originalBytes, sizeof(originalBytes), nullptr)
in DetourCreateRemote (InjectorCLI).

Params:
hProcess = 934
lpFuncOrig = 0x000002876e642180 (in win32u.dll address)

In target 0x000002876e642180 address is not initialized.
The address in target is 00007FF847802180 (NtUserFindWindowEx).

It is because win32u.dll base address in x64dbg process is different (2876E640000) and in target win32u.dll base is "normal" (7FF847800000).

The error happens because user dll VAs are got using GetProcessAddress from host process (in my case x64dbg process). But injection is done into target process (program loaded by x64dbg) where win32u.dll has different base address.
If accidently in same case target process will have same address initialized (but not with win32u.dll) then injection will happen not into win32u.dll functions, resulting in unknown buggy behavior.

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions