Fix x86 inject to x64 process failure on WoA
Add a new interface DetourProcessViaHelperDllsEx that has an individual parameter that accepts a dll path to be loaded by rundll32.exe. But the payload data is still copied from rlpDlls.
Addresses #358
With this change, the x86 process is able to start the helper process (rundll32.exe) with an a64 dll loaded, but inject a x64 dll to the target process.
@microsoft-github-policy-service agree company="Nvidia"
Just to confirm: should I add more comments to around if (!runDll)? I'll be glad to add more comments but I'm not sure if a lot comments will break the coding style of Detours project. I have explained why the new interfaces are added in the commit description, and also links the bug #358 .