 |
function SetMadCHookOption (option: dword; param: PWideChar) : bool; stdcall;
const
DISABLE_CHANGED_CODE_CHECK = $00000003;
SET_INTERNAL_IPC_TIMEOUT = $00000005;
VMWARE_INJECTION_MODE = $00000006;
DONT_TOUCH_RUNNING_PROCESSES = $00000007;
RENEW_OVERWRITTEN_HOOKS = $00000009;
INJECT_INTO_RUNNING_PROCESSES = $0000000a;
UNINJECT_FROM_RUNNING_PROCESSES = $0000000b;
X86_ALLOCATION_ADDRESS = $0000000c;
VERIFY_HOOK_ADDRESS = $0000000d;
DISASM_HOOK_TARGET = $0000000e;
USE_OLD_IPC_LOGIC = $0000000f;
LIMITED_IPC_PORT = $00000010;
HOOK_LOAD_LIBRARY = $00000011;
DISABLE_LDR_LOAD_DLL_SPECIAL_HOOK = $00000012;
DISABLE_PARALLEL_DLL_LOADING = $00000013;
USE_IAT_DLL_INJECTION = $00000014;
SET_SAFE_HOOKING_TIMEOUT = $00000015;
ALWAYS_CHECK_HOOKS = $00000016;
|
|