Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #include <iostream>
- #include <Windows.h>
- int main()
- {
- wchar_t processName[] = L"Process.exe";
- char dllName[] = "Dll.dll";
- STARTUPINFO si;
- PROCESS_INFORMATION pi;
- memset(&si, 0, sizeof(si));
- memset(&pi, 0, sizeof(pi));
- if (CreateProcessW(processName, NULL, NULL, NULL, FALSE, CREATE_SUSPENDED, NULL, NULL, &si, &pi)) {
- LPVOID loadlibrary_adress = GetProcAddress(GetModuleHandleW(L"kernel32.dll"), "LoadLibraryA");
- LPVOID argmemadress = VirtualAllocEx(pi.hProcess, nullptr, sizeof(dllName), MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);
- WriteProcessMemory(pi.hProcess, argmemadress, dllName, sizeof(dllName), NULL);
- CreateRemoteThread(pi.hProcess, nullptr, 0, (LPTHREAD_START_ROUTINE)loadlibrary_adress, argmemadress, 0, nullptr);
- ResumeThread(pi.hThread);
- }
- return 0;
- }
Add Comment
Please, Sign In to add comment