A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #4137  by Meriadoc
 Sun Dec 26, 2010 6:18 am
Thanks for the updates and additions, working great here :)
 #4138  by EP_X0FF
 Sun Dec 26, 2010 7:38 am
Thanks for tests and feedback. Minor fix will be released after NY.
 #4209  by Every1is=
 Thu Dec 30, 2010 8:54 pm
RKUnhookerLE.rar
Standalone exe
(126.26 KiB) Downloaded 18 times
Running the one above on a Vista x32 system, runs a process without window, unable to kill proces itself. That last bit is probably by design I guess, but the no window bit... ?

RkU3.8.389.592.rar
RkUnhooker v3.8 SR2 25.12.2010
(619.84 KiB) Downloaded 39 times
Until I have time to reboot, I can install but not run this version because the other process is already running of course ;-)

Nope. Both run as a process in task manager or procexp, but 1 of the cores is being utilized 100% continuously by that process. It is not in the applications list and doesn't show a window to interact with. Previous versions worked. I installed threatfire on that system too (win vista ultimate x32) so will remove that first and try again.
 #4210  by nullptr
 Fri Dec 31, 2010 1:57 am
Every1is= wrote: I installed threatfire on that system too (win vista ultimate x32) so will remove that first and try again.
Threatfire will always cause problems with most ARKs. Exit the Threatfire GUI and end the Threatfire Service before running.
 #4211  by EP_X0FF
 Fri Dec 31, 2010 5:02 am
This is caused by ThreatFire CreateRemoteThread hook.

Here is normal function

Image

And that with ThreatFire.

Image

RkU hooks CreateRemoteThread inside itself to provide self-protection compatibility with Win32 subsystem notification. It can't hook normally such destroyed code.
Perhaps I will add flag to command line to start without self-protection. However I would not recommend anyone use TF because of this perversion. It hooks numerous API in user mode (including ANSI/Unicode standalone hooks), so whole kernel32.dll is trashed.
 #4224  by EP_X0FF
 Sun Jan 02, 2011 5:44 am
Invalid memory referenced while reading from kernel space. Cannot be fixed right now because it is too specific - I don't know when this event occurred and what this routine is tried to read.
However if this bug appears continuously I need to know more details to reproduce it here.
 #4237  by EP_X0FF
 Mon Jan 03, 2011 8:01 am
Minor update.

changelog:
fixed: STRELiTZIA discovered bugs (more of same kind)
fixed: ThreatFire caused bugs

Image
MD5 for RkU3.8.389.592.exe
9953e08a9669f70ffb1d1b3dca1c583f

SHA-512 for RkU3.8.389.592.exe
32b80bc8b4d49ef3f254f0e41a6897670c6eb93401fddb85985a226b98ee89b6
fc822a57628d416b54964d1ec40c68f8069ac532549aa5c1c2aeff7f60eab9b3
MD5 for RkUnhookerLE.exe
e74bfded61b0b9a97ff8077c8ba2aa41

SHA-512 for RkUnhookerLE.exe
0f08a78329f8224a81a25a8008e9caa17ccd4b4abdc986ccf407aa99d3899f98
bc51ec5e6ce84f93521ab2bcbf2eb7e56228352a68aad2953ff4850a1e79c952
  • 1
  • 9
  • 10
  • 11
  • 12
  • 13
  • 16