void HookApi()
{
//获取CreateMutexW函数地址
Addr = GetProcAddress(LoadLibraryA("Kernel32.dll"), "CreateMutexW");
//保存原始的指令
memcpy(OldOpcode, Addr, 5);
//计算跳转偏移
DWORD Offset = (DWORD)HookCreateMutexA - (DWORD)Addr - 5;
//组合新的Opcode
*(DWORD*)&JmpOpcode[1] = Offset;
}
HANDLE WINAPI HookCreateMutexA(
LPSECURITY_ATTRIBUTES lpMutexAttributes,
BOOL bInitialOwner,
LPCSTR lpName
)
{
HANDLE Handle = 0;
//调用CreateMutexW创建不同名称的互斥体
Handle = CreateMutexW(lpMutexAttributes, bInitialOwner, L"bbbbbbbb23333333");
return Handle;
}
void EnableHook(BOOL Enable = TRUE)
{
DWORD OldProtect = 0;
//修改内存页属性,可读写
VirtualProtect(Addr, 5, PAGE_EXECUTE_READWRITE, &OldProtect);
//填充新的Opcode
memcpy(Addr,Enable ? JmpOpcode:OldOpcode, 5);
//还原目标地址所在分页的属性
VirtualProtect(Addr, 5, OldProtect, &OldProtect);
}