+\r
+int print_process(nssm_service_t *service, kill_t *k) {\r
+ TCHAR exe[EXE_LENGTH];\r
+ TCHAR *buffer = 0;\r
+ if (k->depth) {\r
+ buffer = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (k->depth + 1) * sizeof(TCHAR));\r
+ if (buffer) {\r
+ unsigned long i;\r
+ for (i = 0; i < k->depth; i++) buffer[i] = _T(' ');\r
+ buffer[i] = _T('\0');\r
+ }\r
+ }\r
+\r
+ unsigned long size = _countof(exe);\r
+ if (! imports.QueryFullProcessImageName || ! imports.QueryFullProcessImageName(k->process_handle, 0, exe, &size)) {\r
+ /*\r
+ Fall back to GetModuleFileNameEx(), which won't work for WOW64 processes.\r
+ */\r
+ if (! GetModuleFileNameEx(k->process_handle, NULL, exe, _countof(exe))) {\r
+ long error = GetLastError();\r
+ if (error == ERROR_PARTIAL_COPY) _sntprintf_s(exe, _countof(exe), _TRUNCATE, _T("[WOW64]"));\r
+ else _sntprintf_s(exe, _countof(exe), _TRUNCATE, _T("???"));\r
+ }\r
+ }\r
+\r
+ _tprintf(_T("% 8lu %s%s\n"), k->pid, buffer ? buffer : _T(""), exe);\r
+\r
+ if (buffer) HeapFree(GetProcessHeap(), 0, buffer);\r
+ return 1;\r
+}\r
+\r
+int print_process(kill_t *k) {\r
+ return print_process(NULL, k);\r
+}\r