![]() ![]() So, IMHO, the next flavor of unlocker should also deal with the digital signature of the patched files, and strip them so the patched binary files don't appear as forged from the OS point of view. keyboard and mouse input are back in VM's. ![]() So, I took all the individual files that were modified by the unlocker, and stripped the digital signature (so they appear as not signed), and it worked. It can be well understood as a security feature preventing any forged executable from receiving input of a typed password or so. And it seems that if an executable with a damaged signature is launched, the windows build I have isolate the process from any keyboard or mouse input. Patching the binary files destroy the validity of their digital signature. I have finally identified the culprit, which is probably a new security scheme recently enforced by Windows. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |