I have a dll that is loaded by the program i'm reverse engineering, this dll only contains .text section without any exported functions, my guess is that dll main function contains something interesting. I have a breakpoint trigger when the dll is loaded with the LoadLibraryA function and can see the EIP jump to the beginning of .text section of the dll, and see all the register update as the code is executed inside the dll, however, the instructions I'm looking at seem to not change and still are in the address of the program. also worth mentioning is that the dll is not loaded at the requested address so idk if it's a bug or what, I'm using x32dbg. Any help would be greatly appreciated, thanks
Asked
Active
Viewed 67 times
2
PEB::Ldr
->InMemoryOrderModuleList.Flink
. Then uses the name to facilitate the deobfuscation, it seems. – 0xC0000022L Nov 08 '22 at 14:29