Unable to inject Clink #338
-
Hi, I recently started getting this error message when launching command prompt with Clink injected.
Is it possible to tell the issue from just the above? The logs don't seem to be pointing to anything... or is there a way to enable more verbose logging? |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 3 replies
-
@MrIDK22 v1.2.9 is 15 months old. Would it be possible to upgrade to a more recent version? More logging during |
Beta Was this translation helpful? Give feedback.
-
The only "why" it can get is which API function (if any) returns an error code, and what error code is returned. In this case, everything succeeded up to and including injecting a remote thread into the target process. The most common place for anti-malware software to block Clink is the But the failure occurred in the It already confirmed the DLL file exists, is accessible, is the right bit-ness, and etc. If the So, I'm sorry to say, this is almost certainly due to anti-malware software blocking Clink. There's no way for Clink to find out for sure why errors occur. But you might (or might not) be able to find some logging in the anti-malware suite indicating what it has blocked. Have you tried adding an exception in the anti-malware suite, and also in Windows Defender? (There's nothing Clink can do about this kind of situation.) |
Beta Was this translation helpful? Give feedback.
The only "why" it can get is which API function (if any) returns an error code, and what error code is returned.
In this case, everything succeeded up to and including injecting a remote thread into the target process. The most common place for anti-malware software to block Clink is the
CreateRemoteThread()
API.But the failure occurred in the
LoadLibraryW("C:\Users\<user>\AppData\Local\Temp\clink\dll_cache\1.3.42.ef446e_6e5f8db5\clink_dll_x64.dll")
API call in the remote thread. That's the one place that it doesn't capture an error code. It's technically possible to capture the error code, but it would require injecting a more complex payload into the target process, and frankly that co…