hi guys,
I'm working on a minifilter in preopcallback with irp_mj_set_information to detect delete files operations. I wonder if anyone knows a way to detect approximately the point where the call to DeleteFile was made. By extracting the thread context, I checked that Eip is always in kernel32.dll. The Ebp I get the top of the stack, is a reference but it is not the exact location. If I have a process that calls a function in a dll and it calls DeleteFile, believe Ebp will be pointing to the process and not for the dll. So I ask, what is the best procedure to detect this?
Thanks
I'm working on a minifilter in preopcallback with irp_mj_set_information to detect delete files operations. I wonder if anyone knows a way to detect approximately the point where the call to DeleteFile was made. By extracting the thread context, I checked that Eip is always in kernel32.dll. The Ebp I get the top of the stack, is a reference but it is not the exact location. If I have a process that calls a function in a dll and it calls DeleteFile, believe Ebp will be pointing to the process and not for the dll. So I ask, what is the best procedure to detect this?
Thanks