modunload

From SpybotWiki
Revision as of 16:19, 18 February 2008 by CCRDude (talk | contribs) (New page: {{AdvFileParam|modunload}} Tries to unload DLL through API from specified process. ==Usage== modunload=<filename(string)> ===Examples=== modunload=<$WINDIR>\notepad.exe Tries to unloa...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Tries to unload DLL through API from specified process.

Usage

modunload=<filename(string)>

Examples

modunload=<$WINDIR>\notepad.exe

Tries to unload the current library from notepad.exe, which is a silly example.

Description

Injects code into processes created from the specified executable file to unload the currently tested library from it.

Important: this will probably leave the process in an unstable state, since it does not know the library was unloaded. While this might be useful to remove libraries that are otherwise in use, use with caution!

See also

Similar parameters

Similar commands