I am fiddling with wndprocs and WinSpy++ and i stumbled upon a strange thing with calc.exe. It appears to lack a WndProc.
Here is my screenshot: a test program I made, the WinSpy++ window,, showing N/A, and the culprit.
Maybe the tool is a bit outdated, but the empirical evidence proves no WndProc is there.
I don't know if this is by design(this would be strange), or if I am missing something...
Here is referenced code:
Function FindWindow(title As String) As IntPtr
Return AutoIt.AutoItX.WinGetHandle(title)
End Function
Function GetWindowProc(handle As IntPtr) As IntPtr
Return GetWindowLong(handle, WindowLongFlags.GWL_WNDPROC)
End Function
In short (about your code):
GetWindowLong()
fails because you're trying to read an address in target process address space.EXPLANATION
When
GetWindowLong()
returns 0 it means there is an error, from MSDN:Check
Marshal.GetLastWin32Error()
and you probably see error code isERROR_ACCESS_DENIED
(numeric value is 0x5).Why? Because
GetWindowLong()
is trying to get address (or handle) of window procedure (not in your code, but in target process, in theory it may even be default window procedure but I never saw an application main window that doesn't hanle at least few messages). You may use this trick (but I never tried!) to see if a window is using default procedure (you have an address or not), I don't know...someone should try.Now think what
WNDPROC
is:An address (valid in process A) is not callable in process B (where it makes no sense at all). Windows DLLs code segments are shared across processes (I assume, I didn't check but it's reasonable in the game between safety and performance).
Moreover
CallWindowProc(NULL, ...)
will understand thatNULL
as a special value to invoke window procedure for that window class (onHWND
owner). From MSDN:How Microsoft Spy++ does it (and maybe WinSpy++ does not)? Hard to say without WinSpy++ source code. For sure it's not such easy like
GetWindowLong()
and right way should involveCreateRemoteThread()
and to doLoadLibrary()
from that but both Microsoft Spy++ and WinSpy++ source code aren't available (AFAIK) for further inspection...UPDATE
WinSpy++ inspection/debugging is pretty off-topic with the question (you should post a ticket to developers, your source code may fail for what I explained above, you should - always - check error codes) but we may take a look for fun.
In
InjectThread.c
we see it usesWriteProcessMemory
+CreateRemoteThread
thenReadProcessMemory
to read data back (not relevant code omitted):Window procedure in "General" tab and in "Class" tab differs (in "Class" tab it correctly display a value). From
DisplayClassInfo.c
:As you see they're different values (obtained in different ways). Code to fill
spy_WndProc
is inWinSpy.c
andGetRemoteWindowInfo.c
. Extracted code fromGetRemoteInfo()
inWinSpy.c
:Now in
GetRemoteWindowInfo()
we see a call toGetClassInfoExProc
(injected in the other process):As you can see (please follow using source code)
wcOutput
is what is displayed in "Class" tab andwndproc
what is displayed in "General" tab. SimplyGetWindowLong()
fails butGetClassInfoEx
does not (but they do not necessarily retrieve same value because (if I'm not wrong) what you have inWNDCLASSEX
is what you registered withRegisterClassEx
but what you get withGetWindowLong()
is what you hooked withSetWindowLong()
.