Jump to content

George King

Member
  • Posts

    383
  • Joined

  • Last visited

  • Days Won

    1
  • Donations

    0.00 USD 
  • Country

    Czech Republic

Posts posted by George King

  1. 38 minutes ago, Dietmar said:

    @George King

    I cant remember all, what I changed. But it is much more than in your acpi.sys for XP SP2 bit64.

    Also I remember, that I use for compile 2 modified txt files (hacks from @Mov AX, 0xDEAD ), but you use only one of them.

    And you miss the important hack from Skull for wrong datatype

    Dietmar

    Please show me what's needed to be modded in my files. I will add it to my batch then. 

     

    Maybe @Mov AX, 0xDEAD have some newer diff patches for source now to make it easy?

  2. @Dietmar Yes, its compiled by me, with some tweaks in acpiosnt.rc + type2op.

     

    Not sure ehat you mean with this: I add the Win10 fake and also the modifications from @Mov AX, 0xDEAD from January 2023.

     

    Here are my tweaks: https://ufile.io/lz97knph

     

    And Im auto compiling it with this:

    set PROCESSOR_ARCHITECTURE=x86
    cmd /k "%~dp0Win2K3\NT\tools\razzle.cmd offline No_urt no_binaries no_certcheck No_prefast free && cd %~dp0Win2K3\NT\base\busdrv\acpi\driver && build /Dcegbw"

     

    Please let me know what else I need to add to code.

    Also please try to check if my patched file have all your post compile hacks aswell. Patches should be still same in HEX.

  3. 14 hours ago, Dietmar said:

    @reboot12

    This are hacks against another Bsod, that I forget to implement in the acpi.sys 64 bit version also.

    0xA5 (0x11,0x08,xxx,yyy)  error in _AMLILoadDDB.

    128, 129 are only for the corrected checksum.

    Wish you a nice evening

    Dietmar

     

    @Dietmar I have these post compile hacks. Do you use any others?

     

    	REM 5.1 hacks
    "%~dp0bbe.exe" -b "/\x33\xFF\x0B\xC7\x75/:5" -e "s/\x33\xFF\x0B\xC7\x75/\x33\xFF\x0B\xC7\xEB/" "%~dp0XPSP1\NT\base\busdrv\acpi\driver\nt\obj\i386\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys"
    	"%~dp0bbe.exe" -b "/\x00\x00\x84\xC0\x75\x08/:6" -e "s/\x00\x00\x84\xC0\x75\x08/\x00\x00\x84\xC0\xEB\x08/" "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\x85\xC0\x59\x59\x7C\x21/:6" -e "s/\x85\xC0\x59\x59\x7C\x21/\x85\xC0\x59\x59\x90\x90/" "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\x8B\x48\x18\x7D\x34\x8B/:6" -e "s/\x8B\x48\x18\x7D\x34\x8B/\x8B\x48\x18\xEB\x34\x8B/" "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.1\acpi2.sys" "acpi.sys"
    	"%~dp0PEChecksum.exe" -c "%~dp0Files\ACPI\X-hacked\5.1\acpi.sys"
    	
    REM 5.2 x86 hacks
    "%~dp0bbe.exe" -b "/\x33\xFF\x0B\xC7\x75/:5" -e "s/\x33\xFF\x0B\xC7\x75/\x33\xFF\x0B\xC7\xEB/" "%~dp0Win2K3\NT\base\busdrv\acpi\driver\nt\obj\i386\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys"
    	"%~dp0bbe.exe" -b "/\x00\x00\x84\xC0\x75\x08/:6" -e "s/\x00\x00\x84\xC0\x75\x08/\x00\x00\x84\xC0\xEB\x08/" "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\x85\xC0\x59\x59\x7C\x21/:6" -e "s/\x85\xC0\x59\x59\x7C\x21/\x85\xC0\x59\x59\x90\x90/" "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\x14\x8B\x50\x18\x7D\x21/:6" -e "s/\x14\x8B\x50\x18\x7D\x21/\x14\x8B\x50\x18\xEB\x21/" "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys" -o "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys"
    del /q /s "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys"
    ren "%~dp0Files\ACPI\X-hacked\5.2\acpi2.sys" "acpi.sys"
    	"%~dp0PEChecksum.exe" -c "%~dp0Files\ACPI\X-hacked\5.2\acpi.sys"
    	
    REM 5.2 x64 hacks
    "%~dp0bbe.exe" -b "/\x0F\xBA\xE1\x19\x72/:5" -e "s/\x0F\xBA\xE1\x19\x72/\x0F\xBA\xE1\x19\xEB/" "%~dp0Win2K3\NT\base\busdrv\acpi\driver\nt\obj\amd64\acpi.sys" -o "%~dp0Files\ACPI64\X-hacked\acpi.sys"
    	"%~dp0bbe.exe" -b "/\x00\x00\x84\xC0\x75\x20/:6" -e "s/\x00\x00\x84\xC0\x75\x20/\x00\x00\x84\xC0\xEB\x20/" "%~dp0Files\ACPI64\X-hacked\acpi.sys" -o "%~dp0Files\ACPI64\X-hacked\acpi2.sys"
    del /q /s "%~dp0Files\ACPI64\X-hacked\acpi.sys"
    ren "%~dp0Files\ACPI64\X-hacked\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\xC0\x78\x2E\x48\x8B\x05/:6" -e "s/\xC0\x78\x2E\x48\x8B\x05/\xC0\x90\x90\x48\x8B\x05/" "%~dp0Files\ACPI64\X-hacked\acpi.sys" -o "%~dp0Files\ACPI64\X-hacked\acpi2.sys"
    del /q /s "%~dp0Files\ACPI64\X-hacked\acpi.sys"
    ren "%~dp0Files\ACPI64\X-hacked\acpi2.sys" "acpi.sys"
    	"%~dp0bbe.exe" -b "/\x8B\x41\x20\x79\x2C\x48/:6" -e "s/\x8B\x41\x20\x79\x2C\x48/\x8B\x41\x20\xEB\x2C\x48/" "%~dp0Files\ACPI64\X-hacked\acpi.sys" -o "%~dp0Files\ACPI64\X-hacked\acpi2.sys"
    del /q /s "%~dp0Files\ACPI64\X-hacked\acpi.sys"
    ren "%~dp0Files\ACPI64\X-hacked\acpi2.sys" "acpi.sys"
    	"%~dp0PEChecksum.exe" -c "%~dp0Files\ACPI64\X-hacked\acpi.sys"
    	

  4. On 9/22/2024 at 10:23 PM, AstroSkipper said:

    Here is a review of Huorong Internet Security v6
    https://malwaretips.com/threads/huorong-internet-security-v6-finale.132002/ 
    And the test results are rather disastrous. :o There is still a lot of room for improvement. :rolleyes: So I can't agree with your assessment. nimportequoi.gif

    Interesting, hope they are working on it.

  5. @AstroSkipper All test I found about Huorong were for v5 version and about 5 years old. I quess it's not bad if Microsoft added it to it's store for modern systems.

     

    On my testing machine was installation size +-100MB. Two new processes was added - HipsDaemon.exe +- 160MB RAM and HipsTray.exe with +- 20MB RAM. I have 32GB on this testing machine, so it can eats what they need. But seems it small install size and RAM usage too. CPU usage was not changed at all, my system still have same 1% CPU usage.

  6. 52 minutes ago, doldolekim said:

    one CJK character occupies two bytes. So editing would be limited. If I want strings longer than original, then recompiling SETUPLDR from leaked source is only answer?

    Probably yes, maybe you can find how to properly extract string from this BIN format and then mod it. For example, like Resource Hacker can add longer strings without any issues. I quess recompiling is only way to fully translate it at the moment.

  7. Hi @AstroSkipper I see there is still no mention about Huorong Internet Security 6 which still support Windows XP.  For modern system is also available on Microsoft Store.

    Homepage:

    https://huorong.cn/

    Download x64 v2024.09.20

    https://down-tencent.huorong.cn/sysdiag-all-x64-6.0.2.3-2024.09.20.1.exe

     

    Download x86 v2024.09.20

    https://down-tencent.huorong.cn/sysdiag-all-x86-6.0.2.3-2024.09.20.1.exe

     

    Some pictures from my Windows XP testing machine

    3.png

    1.png


    2.png


    4.png


    5.png


    6.png


    7.png


    8.png


    9.png


    10.png

     

  8. ListDisk v1.1

     

    - Added application Icon and FileVersion

    - Added configuration for building SSE release aswell

    - Improved /mount command, now can mount Windows invisible partitions too, for example 0x17 NTFS Hidden partition, Windows Explorer still can't see it, but it's accessible from CMD, Total Commander or Explorer++ for example. You can also confirm it's mounted using fsutil fsinfo drives command from CMD.

    - Improved /mount command, you can no longer need to specify drive letter, it will now automatically use last available unused letter

    - Improved /mount command, when trying to mount already mounted partition you now receive message: "Partition X on Disk X is already mounted to X"

    - Improved /unmount command, now correctly unmounts Windows Explorer invisible partitions

    - Improved /settype command, now can attributes be changed on already mounted partition. In fact it unmounts, change settings and remount partition back to same letter

    - Improved /setactive command, now can be changed active flag on already mounted partition. In fact it unmounts, change settings and remount partition back to same letter

    - Improved /setlabel, now can be changed partition label on unmounted partition. In fact it mounts partition to temporary free drive letter, change label and unmounts

     

    https://github.com/GeorgeK1ng/ListDisk/releases

×
×
  • Create New...