The direct reference and not call API function call
Private Function GetProcAddress call (ByVal hModule As IntPtr, ByVal procName As String) As UIntPtr
End the FunctionPublic Shared Function LoadLibrary (ByVal lpFileName As String) As IntPtr
End the FunctionPublic Shared Function FreeLibrary (ByVal hModule As IntPtr) As Boolean
End the Function
Private Sub Button1_Click (ByVal sender As System. Object, ByVal e the As System. EventArgs) Handles for. Click
'Dim asm As System. Reflection. The Assembly=System. Reflection. The Assembly. The LoadFile (" E: \ device \ \ inspection \ projects laser engraving + image \ EzCad270 - development version \ EzCad270 - OPEN \ MarkEzd DLL ")
'Dim asm As System. Reflection. The Assembly=System. Reflection. Assembly. LoadFrom (" E: \ device \ \ inspection \ projects laser engraving + image \ EzCad270 - development version \ EzCad270 - OPEN \ MarkEzd DLL ")
Dim A As IntPtr=LoadLibrary (" path and name ")
ListBox1. Items. Add (" handle "& amp; A.T oString)
Dim C As String="LmcLib. LmcErrCode"
Dim As UIntPtr B=GetProcAddress call (A, C)
ListBox1. Items. Add (" DLL output function of address: "& amp; B.T oString)
ListBox1. Items. Add (" pointer to the function name: "& amp; C)
Dim As Boolean=D FreeLibrary (A)
ListBox1. Items. Add (" release results: "& amp; D)
Dim aa As LmcLib. LmcErrCode
End Sub
CodePudding user response:
It seems to be pretty sick of MAO,,,Direct call API, like you call loadlibrary calls its function, compiled using x86,
Then, seemingly only in marking machine debugging,,, like encryption dog