Nice tool -<p>I wrote something that did this too but went about it differently-- instead of injection I spawned the target processes as a child process so I could modify the setting for the children. To do this, I added my binary as a debugger via KLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\target.exe
I was just looking for this a week ago. Although similar can be achieved by dragging windows to another virtual desktop.<p>Is there a way to detect the screen is being captured?