DWORD GetProcessIdByName(LPCTSTR szProcess)//注意要加exe后缀
{
DWORD dwRet=0;
HANDLE hSnapshot=CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS,0);
PROCESSENTRY32 pe32;
pe32.dwSize=sizeof(PROCESSENTRY32);
Process32First(hSnapshot,&pe32);
do
{
if (_tcscmp(pe32.szExeFile,szProcess)==0)
{
dwRet=pe32.th32ProcessID;
break;
}
} while (Process32Next(hSnapshot,&pe32));
CloseHandle(hSnapshot);
return dwRet;
}
BOOL Inject(LPCTSTR szModule, DWORD dwID)
{
HANDLE hProcess = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_CREATE_THREAD | PROCESS_VM_OPERATION | PROCESS_VM_WRITE, FALSE, dwID);
if ( !hProcess ) {
return FALSE;
}
int cByte = (_tcslen(szModule)+1) * sizeof(TCHAR);
LPVOID pAddr = VirtualAllocEx(hProcess, NULL, cByte, MEM_COMMIT, PAGE_READWRITE);
if ( !pAddr || !WriteProcessMemory(hProcess, pAddr, szModule, cByte, NULL))