Re: base addresses of kernel32

2010-07-03 Thread Marcus Meissner
On Sun, Jul 04, 2010 at 10:04:01AM +0400, Илья Басин wrote: > One widely used dll injection technique is copying the dll path to the > target process memory and calling CreateRemoteThread() using the address of > LoadLibraryA as lpStartAddress. This relies on the fact that all processes > have the

base addresses of kernel32

2010-07-03 Thread Илья Басин
One widely used dll injection technique is copying the dll path to the target process memory and calling CreateRemoteThread() using the address of LoadLibraryA as lpStartAddress. This relies on the fact that all processes have the same base address of kernel32.dll (and some other system dlls). On W

The annoying FAQ of detecting Wine

2010-07-03 Thread David Gerard
Unfortunately, this is a FAQ, so I've added it. I based the answer on the last time this came around on wine-users; I'm not a developer, so please sanity-check what I wrote! Hopefully this will be useful in dealing with the actual problems people think they can solve by doing this. http://wiki.win

FAQ just updated and copyedited

2010-07-03 Thread David Gerard
Just went through the FAQ, copyediting, tweaking and bringing things into the present: http://wiki.winehq.org/FAQ?action=diff&rev2=347&rev1=346 Please sanity-check :-) - d.

Re: Why some gdi32 calls aren't caught in relay while some are caught?

2010-07-03 Thread Vitaliy Margolen
On 07/01/2010 12:55 PM, Hayan Lee wrote: > Wine doc says relay supports user32, ntdll, etc, but not gdi32. > However when I run wine, some gdi32 calls are caught, e.g, CreateBitmap() > But some aren't caught, e.g, CreateBitmapIndirect() See RelayFromExclude in http://wiki.winehq.org/UsefulRegistryK