0xfea0dc70 is a virtual address in this case,
its the location of the tagWND structure in
kernel memory. Indeed, you can pull the text out
of edit controls and various other window
elements that we don’t currently analyze.
Brendan Dolan-Gavitt’s initial set of GDI
utilities [1] contained definitions for
_TOOLBAR_WINDOW32, _TEXT_DESCRIPTOR, _EDIT_BOX,
_STATUS_BAR, and a few of the critical
structures for MSHTML documents. However,
they’re for XP SP2/SP3 and may have changed
since then, so its definitely possible, but will
just require a bit of research.
Also, if you have access to a retail version of
Visual Studio (not the free express version),
then you should have Spy++ [2]. This lets you
select any window on your desktop using your
cursor and it will display the details like
handle value, address in kernel memory,
coordinates, and types of messages it
sends/receives.
[1].
[2].
On Mar 8, 2014, at 7:14 PM, Bridgey <
adam.bridge@yahoo.com>
wrote:
> Hi all,
>
> In my continuing exploration of Windows
memory and Volatility I'm current looking at
Windows, literally, the GUI.
>
> Looking at a notepad process, wintree
shows me:
> .Untitled - Notepad (visible)
notepad.exe:100 Notepad
> ..#20128 notepad.exe:100
6.0.7601.17514!msctls_statusbar32
> ..#20126 (visible) notepad.exe:100
6.0.7601.17514!Edit
> .Default IME notepad.exe:100 IME
> .MSCTFIME UI notepad.exe:100 MSCTFIME UI
>
> So, I'm assuming #20128 is the status bar
at the bottom of the Notepad window, and
#20126 is the edit control, that is, the
textarea into which the user types.
>
> This is the corresponding output from the
windows plugin for the edit control:
> Window Handle: #20126 at 0xfea0dc70,
Name:
> ClassAtom: 0xc119, Class:
6.0.7601.17514!Edit
> SuperClassAtom: 0xc018, SuperClass: Edit
> pti: 0xfe2a4008, Tid: 1692 at 0x8550d368
> ppi: 0xffa95550, Process: notepad.exe,
Pid: 100
> Visible: Yes
> Left: 10, Top: 52, Bottom: 485, Right:
701
> Style Flags:
WS_VSCROLL,WS_CHILD,WS_OVERLAPPED,WS_VISIBLE,WS_HSCROLL
> ExStyle Flags:
WS_EX_CLIENTEDGE,WS_EX_LTRREADING,WS_EX_RIGHTSCROLLBAR,WS_EX_LEFT
> Window procedure: 0x744399d0
>
> Question 1:
> Window Handle: #20126 at 0xfea0dc70 -
what is the offset? Physical, virtual? Of
what? The Edit control object?
> (I'm guessing: physical, yes, of the edit
control object.)
>
> Question 2:
> I can see that it's Window-esque
properties (X, Y, width, height, style flags,
et al) are all clearly present., but where can
I find information specific to this control
(in this instance, an 'Edit'). For example,
maybe the text it contains?
> (I'm guessing, take a look at 0xfea0dc70
and there'll be some kind of structure to
parse.)
>
> As always, many thanks. (This is all
going towards a plugin that I'm hoping to
write!)
> Also as always, if I could've found this
information on my own, please let me know
where to look.
> I've read the Command Reference and the
associated MoVP posts.
>
> Adam
>
_______________________________________________
> Vol-users mailing list
>
Vol-users@volatilityfoundation.org
>
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users