v0.20.0
-
Critical Stealth Fix: Bootstrap Direct Syscalls (thanks @wrapdavid for the sharp-eyed report!): The reflective loader's bootstrap now correctly invokes direct syscalls for
NtAllocateVirtualMemoryandNtProtectVirtualMemorythrough the linkedSyscallTrampolineassembly function.- The bootstrap now calls the
SyscallTrampolineassembly used by the injector stage, with aSyscallEntrystruct layout matching the ASM expectations (gadget pointer at offset 0, arg count at offset 8, SSN at offset 12). - All
VirtualAlloc/VirtualProtectfallback code has been permanently removed. The bootstrap now operates exclusively through direct syscalls.
- The bootstrap now calls the
-
Avast Secure Browser Support: Added full App-Bound Encryption decryption support for Avast Secure Browser.
- Avast's
IElevatorChromeCOM interface has 12 methods (vs Chrome's 3), withDecryptDataat vtable slot 13 (offset 104 bytes). - New
IAvastElevatorCOM interface definition with complete vtable layout. - Browser discovery via Windows Registry with standard and WOW6432Node paths.
- Correctly routes Avast through the
IAvastElevatorCOM path for vtable-compatible DecryptData invocation. - Use
chromelevator.exe avastor include inallscan.
- Avast's
-
Architecture Detection Fix: Replaced
IsWow64Process2-based architecture detection with direct PE header reading.IsWow64Process2returns incorrect results for x64 processes running under emulation on ARM64 Windows (reportsprocessArch = 0), causing the tool to misidentify the target architecture.- Now reads the PE file header's
Machinefield directly from the browser executable, which is always accurate regardless of emulation layer.