Kurtbeyi
Misafir Editör
İnjection Dll Thread2
Kod:
#include <Windows.h>
#include <iostream>
#include <TlHelp32.h>
using namespace std;
bool InjectDLL(DWORD ProcessID);
char dll[] = "cod7.dll";
char ProcessName[]= "BlackOps.exe";
typedef HINSTANCE (*fpLoadLibrary)(char*);
int main()
{
DWORD processId = NULL;
PROCESSENTRY32 pe32 = {sizeof(PROCESSENTRY32)};
HANDLE hProcSnap;
while(!processId)
{
system("CLS");
cout <<"OYUN BEKLENIYOR" << ProcessName <<"..."<<endl;
cout<<"OYUNA GIRINIZ"<<endl;
hProcSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS,0);
if(Process32First(hProcSnap,&pe32))
{
do
{
if(!strcmp(pe32.szExeFile,ProcessName))
{
processId = pe32.th32ProcessID;
break;
}
}
while(Process32Next(hProcSnap,&pe32));
}
Sleep(1000);
}
while(!InjectDLL(processId))
{
system("CLS");
cout <<"Dll yok"<<endl;
Sleep(1000);
}
cout<<"Dll Basari ile Injeklendi"<<endl<<endl;
cout<<"5 saniye sonra kapanacaktir"<<endl;
CloseHandle(hProcSnap);
Sleep(5000);
return(0);
}
bool InjectDLL(DWORD ProcessID)
{
HANDLE hProc;
LP**** paramAddr;
HINSTANCE hDll = LoadLibrary("KARNEL32");
fpLoadLibrary LoadLibraryAddr = (fpLoadLibrary)GetProcAddress(hDll,"LoadLibraryA");
hProc = OpenProcess(PROCESS_ALL_ACCESS,false,ProcessID);
char dllPath[250] = "C:\cod7.dll";
strcat(dllPath,dll);
paramAddr =VirtualAllocEx(hProc,0,strlen(dllPath)+1,MEM_COMMIT,PAGE_READWRITE);
bool memoryWritten = WriteProcessMemory(hProc,paramAddr,dllPath,strlen(dllPath)+1,NULL);
CreateRemoteThread(hProc,0,0,(LPTHREAD_START_ROUTINE)LoadLibraryAddr,paramAddr,0,0);
CloseHandle(hProc);
return memoryWritten;
}