Introduction - If you have any usage issues, please Google them yourself
DLL injection, so what enumeration process, the search window and the process of setting privileges things that saved the West. Annex with a testDll.dll, I wrote a test DLL, because the DLL may be injected into the reaction, so I wrote a DLL, in which added a MessageBox, can pop up years, so know DLL Run no. DLL is VC++ Write, because I use the mini version of VB, only to write ActiveX DLL, and this DLL can not be used to inject (I wrote a month, in the Main function in writing a MsgBox, restart the object located for the Sub Main, discovery can be injected, but did not appear MsgBox), if the DLL source who said on Posted, me up.
Packet : 1588387811.rar filelist
VB6_RemoteLoadDll\COMDLG32.OCX
VB6_RemoteLoadDll\frmMain.frm
VB6_RemoteLoadDll\modRemoteLoadDLL.bas
VB6_RemoteLoadDll\RemoteLoadDLL.exe
VB6_RemoteLoadDll\RemoteLoadDLL.vbp
VB6_RemoteLoadDll\RemoteLoadDLL.vbw
VB6_RemoteLoadDll\testDll.dll
VB6_RemoteLoadDll