The information in this article applies to:
SYMPTOMS
Under both Windows NT and Windows 95, a Win32 application can set a system
wide WH_CALLWNDPROC hook using the SetWindowsHookEx() API. This hook allows
the application to examine messages being sent by any process in the system
using the SendMessage() API. The DLL containing the hook callback procedure
is automatically injected into the address spaces of any process that calls
SendMessage(). Under WINDOWS 95, pressing the ALT+ESC keys when the hook is
installed injects the DLL into the KERNEL32.DLL process.
RESOLUTIONThe only way to resolve this problem currently is to restart the machine. STATUSMicrosoft has confirmed this to be a bug in the products listed at the beginning of this article. We are researching this problem and will post new information here in the Microsoft Knowledge Base as it becomes available. Additional query words: 4.00
Keywords : |
Last Reviewed: March 8, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |