Three doubts 1) Suppose I get the call stack as below
user32.dll!_InternalCallWinProc@20() + 0x28 bytes
user32.dll!_UserCallWinProcCheckWow@32() + 0xb7 bytes
user32.dll!_CallWindowProcAorW@24() + 0x51 bytes
user32.dll!_CallWindowProcW@20() + 0x1b bytes
Now what are the bytes mentioned at the end of each function? Like for first statement what is 0x28 bytes.
2) How to put breakpoint on a windows system dll in VS ? In windbg I can search for a particular function of windows system dll as
>x wininet!*funcA*
with this command I can get the address of this function and can put breakpoint . Can I do the same in Visual Studio?
3) I don't have Symbol file of a dll. The call stack I am getting in disassembly is
7814XXX0 call dword ptr [__imp__WindowsFuncA@32 (781EXXXXh)]
What is __imp__
in above call stack? Does this mean that this windows function is hooked to some other dll?