Program that inject a Dll to a selected Process
How does it work?
Steps:
- Obtain a handle to kernel32.dll
- Get adress of LoadLibraryA
- Scan for process that we are lokkong for to inject our Dll
- Obtain handle to a process
- Suspend process
- Alocate memory in process
- Save Dll to a process
- Create remote thread that will "run" our Dll in a proces
- Resume process
- Clear memory