mirror of
https://github.com/rapid7/metasploit-payloads
synced 2024-11-26 17:41:08 +01:00
parent
aff81538ec
commit
a91fb72536
@ -18,7 +18,7 @@ static BOOL pRtlCreateUserThreadAttempted = FALSE;
|
||||
typedef DWORD (WINAPI * PGetThreadId)(HANDLE);
|
||||
/*! @brief Reference to the loaded GetThreadId function pointer. */
|
||||
static PGetThreadId pGetThreadId = NULL;
|
||||
/*! @brief Indication of whether an attempt to locate the pGetThreadId pointer has been made. */
|
||||
/*! @brief Indication of whether an attempt to locate the pRtlCreateUserThread pointer has been made. */
|
||||
static BOOL pGetThreadIdAttempted = FALSE;
|
||||
|
||||
/*!
|
||||
@ -93,7 +93,7 @@ HANDLE create_remote_thread(HANDLE hProcess, SIZE_T sStackSize, LPVOID pvStartAd
|
||||
pGetThreadId = (PGetThreadId)GetProcAddress(GetModuleHandleA("kernel32"), "GetThreadId");
|
||||
if (pGetThreadId)
|
||||
{
|
||||
dprintf("[REMOTETHREAD] GetThreadId found at %p", pGetThreadId);
|
||||
dprintf("[REMOTHREAD] GetThreadId found at %p", pGetThreadId);
|
||||
}
|
||||
}
|
||||
pGetThreadIdAttempted = TRUE;
|
||||
|
Loading…
Reference in New Issue
Block a user