首页
社区
课程
招聘
[求助]这个hook有问题吗?怎么hook不上
发表于: 2007-12-10 00:13 5164

[求助]这个hook有问题吗?怎么hook不上

2007-12-10 00:13
5164
//hook.c
#include <ntddk.h>
typedef struct _SERVICE_DESCRIPTOR_TABLE
{
    PULONG ServiceTableBase;
    PULONG ServiceCounterTableBase;
    ULONG NumberOfService;
    ULONG ParamTableBase;
}SERVICE_DESCRIPTOR_TABLE,*PSERVICE_DESCRIPTOR_TABLE; //由于KeServiceDescriptorTable只有一项,这里就简单点了

extern PSERVICE_DESCRIPTOR_TABLE KeServiceDescriptorTable;//KeServiceDescriptorTable为导出函数

/////////////////////////////////////
VOID Hook();
VOID Unhook();
VOID OnUnload(IN PDRIVER_OBJECT DriverObject);
//////////////////////////////////////
ULONG JmpDeviceIoControlFile = 0;
ULONG JmpNtOpenProcess = 0;
ULONG JmpNtProtectVirtualMemory = 0;
ULONG JmpNtReadVirtualMemory = 0;
ULONG JmpNtWriteVirtualMemory = 0;
ULONG JmpNtOpenSection = 0;
ULONG JmpNtSuspendThread = 0;

ULONG OldDeviceIoControlAddress = 0;
ULONG OldNtOpenProcessAddress = 0;
ULONG OldNtProtectVirtualMemoryAddress = 0;
ULONG OldNtReadVirtualMemoryAddress = 0;
ULONG OldWriteVirtualMemoryAddress = 0;
ULONG OldNtOpenSectionAddress = 0;
ULONG OldNtSuspendThreadAddress = 0;

//////////////////////////////////////
__declspec(naked) NTSTATUS __stdcall MyNtDeviceIoControlFile(
    IN HANDLE FileHandle,
    IN HANDLE Event OPTIONAL,
    IN PIO_APC_ROUTINE ApcRoutine OPTIONAL,
    IN PVOID ApcContext OPTIONAL,
    OUT PIO_STATUS_BLOCK IoStatusBlock,
    IN ULONG IoControlCode,
    IN PVOID InputBuffer OPTIONAL,
    IN ULONG InputBufferLength,
    OUT PVOID OutputBuffer OPTIONAL,
    IN ULONG OutputBufferLength
    )
{
    __asm
    {
            mov edi,edi
            push ebp
            mov ebp,esp
            push 1
            jmp [JmpDeviceIoControlFile]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtOpenProcess(
    OUT PHANDLE ProcessHandle,
    IN ACCESS_MASK AccessMask,
    IN POBJECT_ATTRIBUTES ObjectAttributes,
    IN PCLIENT_ID ClientId)
{
    __asm
    {
            push 0C4h
            push 0x804db4a0 //共十个字节
            jmp [JmpNtOpenProcess]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtProtectVirtualMemory(
    IN HANDLE ProcessHandle,
    IN OUT PVOID *BaseAddress,
    IN OUT PULONG NumberOfBytesToProtect,
    IN ULONG NewAccessProtection,
    OUT PULONG OldAccessProtection
    )//7
{
    __asm
    {

            push 0x44
            push 0x804db078
            jmp [JmpNtProtectVirtualMemory]
    }
}

__declspec(naked) NTSTATUS __stdcall MyNtReadVirtualMemory(
    IN HANDLE ProcessHandle,
    IN PVOID BaseAddress,
    OUT PVOID Buffer,
    IN ULONG NumberOfBytesToRead,
    OUT PULONG NumberOfBytesReaded OPTIONAL
    )//7
{
    __asm
    {
            push 0x1C
            push 0x804daed0
            jmp [JmpNtReadVirtualMemory]
    }
}

__declspec(naked) NTSTATUS __stdcall MyNtWriteVirtualMemory(
    IN HANDLE ProcessHandle,
    IN PVOID BaseAddress,
    IN PVOID Buffer,
    IN ULONG NumberOfBytesToWrite,
    OUT PULONG NumberOfBytesWritten OPTIONAL)//7
{
    __asm
    {

            push 0x1C
            push 0x804daee8
            jmp [JmpNtWriteVirtualMemory]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtOpenSection(
    OUT PHANDLE SectionHandle,
    IN ACCESS_MASK DesiredAccess,
    IN POBJECT_ATTRIBUTES ObjectAttributes)//7
{
    __asm
    {

            push 0x18
            push 0x804dace0
            jmp [JmpNtOpenSection]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtSuspendThread(
    IN HANDLE ThreadHandle,
    OUT PULONG PreviousSuspendCount OPTIONAL )//7
{
    __asm
    {

            push 0x20
            push 0x804db9e0
            jmp [JmpNtSuspendThread]
    }
}
///////////////////////////////////////////////////

NTSTATUS DriverEntry(IN PDRIVER_OBJECT DriverObject,PUNICODE_STRING RegistryPath)
{
        DriverObject->DriverUnload = OnUnload;
        DbgPrint("Unhooker load");
        Hook();
        return STATUS_SUCCESS;
}
/////////////////////////////////////////////////////
VOID OnUnload(IN PDRIVER_OBJECT DriverObject)
{
        DbgPrint("Unhooker unload!");
        Unhook();
}
/////////////////////////////////////////////////////
VOID Hook()
{
        //得到内核函数在SSDT表中索引的地址
        ULONG NtDeviceIoControlIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x42);
        ULONG NtOpenProcessIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7a);
        ULONG NtProtectVirtualMemoryIndexAddress        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x89);
        ULONG NtReadVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xba);
        ULONG NtWriteVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x115);
        ULONG NtOpenSectionIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7D);
        ULONG NtSuspendThreadIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xFE);

        //在SSDT表中取到内核函数的地址,并保存以便卸载驱动的时候恢复

        OldDeviceIoControlAddress                                =                 *(ULONG*)NtDeviceIoControlIndexAddress ;
        OldNtOpenProcessAddress                                        =                 *(ULONG*)NtOpenProcessIndexAddress ;
        OldNtProtectVirtualMemoryAddress                =                 *(ULONG*)NtProtectVirtualMemoryIndexAddress ;
        OldNtReadVirtualMemoryAddress                        =                 *(ULONG*)NtReadVirtualMemoryIndexAddress ;
        OldWriteVirtualMemoryAddress                        =                 *(ULONG*)NtWriteVirtualMemoryIndexAddress;
        OldNtOpenSectionAddress                                        =                 *(ULONG*)NtOpenSectionIndexAddress ;
        OldNtSuspendThreadAddress                                =                 *(ULONG*)NtSuspendThreadIndexAddress ;

        //得到跳转指令的位置
        JmpDeviceIoControlFile                        =         OldDeviceIoControlAddress+7;
        JmpNtOpenProcess                                =         OldNtOpenProcessAddress + 10;
        JmpNtProtectVirtualMemory                =         OldNtProtectVirtualMemoryAddress + 7;
        JmpNtReadVirtualMemory                        =         OldNtReadVirtualMemoryAddress + 7;
        JmpNtWriteVirtualMemory                        =         OldWriteVirtualMemoryAddress + 7;
        JmpNtOpenSection                                =         OldNtSuspendThreadAddress + 7;
        JmpNtSuspendThread                                =         OldNtSuspendThreadAddress + 7;

        __asm{//去掉内存保护
                cli
                mov eax,cr0
                and eax,not 10000h
                mov cr0,eax
        }

        //把我们自己函数写进SSDT表中索引位置
        *(ULONG*)NtDeviceIoControlIndexAddress                                = (ULONG)MyNtDeviceIoControlFile;
        *(ULONG*)NtOpenProcessIndexAddress                                        = (ULONG)MyNtOpenProcess;
        *(ULONG*)NtProtectVirtualMemoryIndexAddress                 = (ULONG)MyNtProtectVirtualMemory;
        *(ULONG*)NtReadVirtualMemoryIndexAddress                        = (ULONG)MyNtReadVirtualMemory;
        *(ULONG*)NtWriteVirtualMemoryIndexAddress                        = (ULONG)MyNtWriteVirtualMemory;
        *(ULONG*)NtOpenSectionIndexAddress                                        = (ULONG)MyNtOpenSection;
        *(ULONG*)NtSuspendThreadIndexAddress                                = (ULONG)MyNtSuspendThread;

        __asm{//恢复内存保护
                mov eax,cr0
                or eax,10000h
                mov cr0,eax
                sti
        }
        DbgPrint("Hook");

}
//////////////////////////////////////////////////////
VOID Unhook()
{
        //得到内核函数在SSDT表中索引的地址
        ULONG NtDeviceIoControlIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x42);
        ULONG NtOpenProcessIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7a);
        ULONG NtProtectVirtualMemoryIndexAddress        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x89);
        ULONG NtReadVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xba);
        ULONG NtWriteVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x115);
        ULONG NtOpenSectionIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7D);
        ULONG NtSuspendThreadIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xFE);

        __asm{
                cli
                mov eax,cr0
                and eax,not 10000h
                mov cr0,eax
        }

        //在SSDT表中索引的地址恢复系统内核函数

        *(ULONG*)NtDeviceIoControlIndexAddress                =         (ULONG)OldDeviceIoControlAddress;
        *(ULONG*)NtOpenProcessIndexAddress                        =         (ULONG)OldNtOpenProcessAddress;
        *(ULONG*)NtProtectVirtualMemoryIndexAddress =         (ULONG)OldNtProtectVirtualMemoryAddress;
        *(ULONG*)NtReadVirtualMemoryIndexAddress        =         (ULONG)OldNtReadVirtualMemoryAddress;
        *(ULONG*)NtWriteVirtualMemoryIndexAddress        =         (ULONG)OldWriteVirtualMemoryAddress;
        *(ULONG*)NtOpenSectionIndexAddress                        =         (ULONG)OldNtOpenSectionAddress;
        *(ULONG*)NtSuspendThreadIndexAddress                =         (ULONG)OldNtSuspendThreadAddress;

        __asm{
                mov eax,cr0
                or eax,10000h
                mov cr0,eax
                sti
        }

        DbgPrint("Unhook");

}

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (5)
雪    币: 217
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
2
修改之后内部inlinehook还是hook不上,难道堕落天才的方法真的堕落了 :( 安装钩子之后一系统连个进程也打不开了.
2007-12-10 18:22
0
雪    币: 494
活跃值: (629)
能力值: ( LV9,RANK:1210 )
在线值:
发帖
回帖
粉丝
3
那么多硬编码的东西,你核对过你的os没有? 起码我的XP SP2上NtOpenProcess和你的不同,不蓝屏是你运气好

nt!NtOpenProcess:
80573d06 68c4000000      push    0C4h
80573d0b 6810b44e80      push    offset nt!ObWatchHandles+0x25c (804eb410)
80573d10 e826f7f6ff      call    nt!_SEH_prolog (804e343b)
80573d15 33f6            xor     esi,esi
80573d17 8975d4          mov     dword ptr [ebp-2Ch],esi
80573d1a 33c0            xor     eax,eax
80573d1c 8d7dd8          lea     edi,[ebp-28h]
80573d1f ab              stos    dword ptr es:[edi]
2007-12-10 18:41
0
雪    币: 217
活跃值: (10)
能力值: ( LV3,RANK:20 )
在线值:
发帖
回帖
粉丝
4
版本        5.1.2600 Service Pack 2 内部版本号 2600
通过了.我
  JmpNtOpenSection        =   OldNtSuspendThreadAddress + 7;
  JmpNtSuspendThread        =   OldNtSuspendThreadAddress + 7;
写成一样了.

//hook.c
#include <ntddk.h>
typedef struct _SERVICE_DESCRIPTOR_TABLE
{
    PULONG ServiceTableBase;
    PULONG ServiceCounterTableBase;
    ULONG NumberOfService;
    ULONG ParamTableBase;
}SERVICE_DESCRIPTOR_TABLE,*PSERVICE_DESCRIPTOR_TABLE; //由于KeServiceDescriptorTable只有一项,这里就简单点了

extern PSERVICE_DESCRIPTOR_TABLE KeServiceDescriptorTable;//KeServiceDescriptorTable为导出函数

/////////////////////////////////////
VOID Hook();
VOID Unhook();
VOID OnUnload(IN PDRIVER_OBJECT DriverObject);
//////////////////////////////////////
ULONG JmpDeviceIoControlFile = 0;
ULONG JmpNtOpenProcess = 0;
ULONG JmpNtProtectVirtualMemory = 0;
ULONG JmpNtReadVirtualMemory = 0;
ULONG JmpNtWriteVirtualMemory = 0;
ULONG JmpNtOpenSection = 0;
ULONG JmpNtSuspendThread = 0;

ULONG OldDeviceIoControlAddress = 0;
ULONG OldNtOpenProcessAddress = 0;
ULONG OldNtProtectVirtualMemoryAddress = 0;
ULONG OldNtReadVirtualMemoryAddress = 0;
ULONG OldWriteVirtualMemoryAddress = 0;
ULONG OldNtOpenSectionAddress = 0;
ULONG OldNtSuspendThreadAddress = 0;

//////////////////////////////////////
__declspec(naked) NTSTATUS __stdcall MyNtDeviceIoControlFile(
    IN HANDLE FileHandle,
    IN HANDLE Event OPTIONAL,
    IN PIO_APC_ROUTINE ApcRoutine OPTIONAL,
    IN PVOID ApcContext OPTIONAL,
    OUT PIO_STATUS_BLOCK IoStatusBlock,
    IN ULONG IoControlCode,
    IN PVOID InputBuffer OPTIONAL,
    IN ULONG InputBufferLength,
    OUT PVOID OutputBuffer OPTIONAL,
    IN ULONG OutputBufferLength
    )
{
    __asm
    {
            mov edi,edi
            push ebp
            mov ebp,esp
            push 1
            jmp [JmpDeviceIoControlFile]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtOpenProcess(
    OUT PHANDLE ProcessHandle,
    IN ACCESS_MASK AccessMask,
    IN POBJECT_ATTRIBUTES ObjectAttributes,
    IN PCLIENT_ID ClientId)
{
    __asm
    {
            push 0C4h
            push 0x804db4a0 //共十个字节
            jmp [JmpNtOpenProcess]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtProtectVirtualMemory(
    IN HANDLE ProcessHandle,
    IN OUT PVOID *BaseAddress,
    IN OUT PULONG NumberOfBytesToProtect,
    IN ULONG NewAccessProtection,
    OUT PULONG OldAccessProtection
    )//7
{
    __asm
    {

            push 0x44
            push 0x804db078
            jmp [JmpNtProtectVirtualMemory]
    }
}

__declspec(naked) NTSTATUS __stdcall MyNtReadVirtualMemory(
    IN HANDLE ProcessHandle,
    IN PVOID BaseAddress,
    OUT PVOID Buffer,
    IN ULONG NumberOfBytesToRead,
    OUT PULONG NumberOfBytesReaded OPTIONAL
    )//7
{
    __asm
    {
            push 0x1C
            push 0x804daed0
            jmp [JmpNtReadVirtualMemory]
    }
}

__declspec(naked) NTSTATUS __stdcall MyNtWriteVirtualMemory(
    IN HANDLE ProcessHandle,
    IN PVOID BaseAddress,
    IN PVOID Buffer,
    IN ULONG NumberOfBytesToWrite,
    OUT PULONG NumberOfBytesWritten OPTIONAL)//7
{
    __asm
    {

            push 0x1C
            push 0x804daee8
            jmp [JmpNtWriteVirtualMemory]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtOpenSection(
    OUT PHANDLE SectionHandle,
    IN ACCESS_MASK DesiredAccess,
    IN POBJECT_ATTRIBUTES ObjectAttributes)//7
{
    __asm
    {

            push 0x18
            push 0x804dace0
            jmp [JmpNtOpenSection]
    }
}
__declspec(naked) NTSTATUS __stdcall MyNtSuspendThread(
    IN HANDLE ThreadHandle,
    OUT PULONG PreviousSuspendCount OPTIONAL )//7
{
    __asm
    {

            push 0x20
            push 0x804db9e0
            jmp [JmpNtSuspendThread]
    }
}
///////////////////////////////////////////////////

NTSTATUS DriverEntry(IN PDRIVER_OBJECT DriverObject,PUNICODE_STRING RegistryPath)
{
        DriverObject->DriverUnload = OnUnload;
        DbgPrint("Unhooker load");
        Hook();
        return STATUS_SUCCESS;
}
/////////////////////////////////////////////////////
VOID OnUnload(IN PDRIVER_OBJECT DriverObject)
{
        DbgPrint("Unhooker unload!");
        Unhook();
}
/////////////////////////////////////////////////////
VOID Hook()
{
        //得到内核函数在SSDT表中索引的地址
        ULONG NtDeviceIoControlIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x42);
        ULONG NtOpenProcessIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7a);
        ULONG NtProtectVirtualMemoryIndexAddress        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x89);
        ULONG NtReadVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xba);
        ULONG NtWriteVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x115);
        ULONG NtOpenSectionIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7D);
        ULONG NtSuspendThreadIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xFE);

        //在SSDT表中取到内核函数的地址,并保存以便卸载驱动的时候恢复

        OldDeviceIoControlAddress                                =                 *(ULONG*)NtDeviceIoControlIndexAddress ;
        OldNtOpenProcessAddress                                        =                 *(ULONG*)NtOpenProcessIndexAddress ;
        OldNtProtectVirtualMemoryAddress                =                 *(ULONG*)NtProtectVirtualMemoryIndexAddress ;
        OldNtReadVirtualMemoryAddress                        =                 *(ULONG*)NtReadVirtualMemoryIndexAddress ;
        OldWriteVirtualMemoryAddress                        =                 *(ULONG*)NtWriteVirtualMemoryIndexAddress;
        OldNtOpenSectionAddress                                        =                 *(ULONG*)NtOpenSectionIndexAddress ;
        OldNtSuspendThreadAddress                                =                 *(ULONG*)NtSuspendThreadIndexAddress ;

        //得到跳转指令的位置
        JmpDeviceIoControlFile                        =         OldDeviceIoControlAddress+7;
        JmpNtOpenProcess                                =         OldNtOpenProcessAddress + 10;
        JmpNtProtectVirtualMemory                =         OldNtProtectVirtualMemoryAddress + 7;
        JmpNtReadVirtualMemory                        =         OldNtReadVirtualMemoryAddress + 7;
        JmpNtWriteVirtualMemory                        =         OldWriteVirtualMemoryAddress + 7;
        JmpNtOpenSection                                =         OldNtOpenSectionAddress + 7;
        JmpNtSuspendThread                                =         OldNtSuspendThreadAddress + 7;

        __asm{//去掉内存保护
                cli
                mov eax,cr0
                and eax,not 10000h
                mov cr0,eax
        }

        //把我们自己函数写进SSDT表中索引位置
        *(ULONG*)NtDeviceIoControlIndexAddress                                = (ULONG)MyNtDeviceIoControlFile;
        *(ULONG*)NtOpenProcessIndexAddress                                        = (ULONG)MyNtOpenProcess;
        *(ULONG*)NtProtectVirtualMemoryIndexAddress                 = (ULONG)MyNtProtectVirtualMemory;
        *(ULONG*)NtReadVirtualMemoryIndexAddress                        = (ULONG)MyNtReadVirtualMemory;
        *(ULONG*)NtWriteVirtualMemoryIndexAddress                        = (ULONG)MyNtWriteVirtualMemory;
        *(ULONG*)NtOpenSectionIndexAddress                                        = (ULONG)MyNtOpenSection;
        *(ULONG*)NtSuspendThreadIndexAddress                                = (ULONG)MyNtSuspendThread;

        __asm{//恢复内存保护
                mov eax,cr0
                or eax,10000h
                mov cr0,eax
                sti
        }
        DbgPrint("Hook");

}
//////////////////////////////////////////////////////
VOID Unhook()
{
        //得到内核函数在SSDT表中索引的地址
        ULONG NtDeviceIoControlIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x42);
        ULONG NtOpenProcessIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7a);
        ULONG NtProtectVirtualMemoryIndexAddress        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x89);
        ULONG NtReadVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xba);
        ULONG NtWriteVirtualMemoryIndexAddress                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x115);
        ULONG NtOpenSectionIndexAddress                                =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0x7D);
        ULONG NtSuspendThreadIndexAddress                        =         (ULONG)(KeServiceDescriptorTable->ServiceTableBase+0xFE);

        __asm{
                cli
                mov eax,cr0
                and eax,not 10000h
                mov cr0,eax
        }

        //在SSDT表中索引的地址恢复系统内核函数

        *(ULONG*)NtDeviceIoControlIndexAddress                =         (ULONG)OldDeviceIoControlAddress;
        *(ULONG*)NtOpenProcessIndexAddress                        =         (ULONG)OldNtOpenProcessAddress;
        *(ULONG*)NtProtectVirtualMemoryIndexAddress =         (ULONG)OldNtProtectVirtualMemoryAddress;
        *(ULONG*)NtReadVirtualMemoryIndexAddress        =         (ULONG)OldNtReadVirtualMemoryAddress;
        *(ULONG*)NtWriteVirtualMemoryIndexAddress        =         (ULONG)OldWriteVirtualMemoryAddress;
        *(ULONG*)NtOpenSectionIndexAddress                        =         (ULONG)OldNtOpenSectionAddress;
        *(ULONG*)NtSuspendThreadIndexAddress                =         (ULONG)OldNtSuspendThreadAddress;

        __asm{
                mov eax,cr0
                or eax,10000h
                mov cr0,eax
                sti
        }

        DbgPrint("Unhook");

}
2007-12-10 19:26
0
雪    币: 1852
活跃值: (504)
能力值: (RANK:1010 )
在线值:
发帖
回帖
粉丝
5
自己埋雷自己挖!
2007-12-10 22:01
0
雪    币: 709
活跃值: (2420)
能力值: ( LV12,RANK:1010 )
在线值:
发帖
回帖
粉丝
6
你这不是已经anti Hook了嘛。摘掉Timer就好了。免得又被HOOK了。。。
硬编码实在是多
2007-12-10 22:47
0
游客
登录 | 注册 方可回帖
返回
//