

So, to answer the first question our first subtask is to find where ‘AuxKlibQueryModuleInformation’ is implemented. It’s not so clear from the description if the images are the images that are loaded into memory or only those that are loaded Ok, sounds like it should return a list of images. MSDN: The AuxKlibQueryModuleInformation routine retrieves information about the image modules that the operating system has loaded. Let’s understand what is “AuxKlibQueryModuleInformation”:
#Klib windows how to
Using a decompiler can save a lot of time, but learning how to navigate in the disassembly window is valuable for reverse engineering. In this exercise, we will not use the decompiler to practice reading assembly code.

Ok, to solve this exercise will use IDA to statically reverse engineer the functions.

Ok, So where can we begin? To solve this exercise, let’s divide it to the tasks we need to perform: The internal function handling this request (and others) is fairly large, so Multiple threads are requesting access to the loaded module list? Note: Next, reverse engineer AuxKlibQueryModuleInformation on This API guarantee that the returned module list is always up-to-date? Explain Modules with the documented API AuxKlibQueryModuleInformation. In the walk-through, we mentioned that a driver can enumerate all loaded This exercise is one of the easiest exercises in the In this article I’m going over the solution to reverse engineering AuxKlibQueryModuleInformation. AuxKlibQueryModuleInformation Fri, Dec 27, 2019
