Results 1 to 3 of 3
  1. #1
    Senior Member The_USDL is on a distinguished road The_USDL's Avatar
    Join Date
    2011 Oct
    Thanked 538 Times in 47 Posts
    Rep Power

    [Tutorial]Loading a DLL from memory

    Loading a DLL from memory

    This tutorial describes a technique how a dynamic link library (DLL) can be loaded from memory without storing it on the hard-disk first.


    The default windows API functions to load external libraries into a program (LoadLibrary, LoadLibraryEx) only work with files on the filesystem. It’s therefore impossible to load a DLL from memory. But sometimes, you need exactly this functionality (e.g. you don’t want to distribute a lot of files or want to make disassembling harder). Common workarounds for this problems are to write the DLL into a temporary file first and import it from there. When the program terminates, the temporary file gets deleted.

    In this tutorial, I will describe first, how DLL files are structured and will present some code that can be used to load a DLL completely from memory – without storing on the disk first.

    Windows executables – the PE format

    Most windows binaries that can contain executable code (.exe, .dll, .sys) share a common file format that consists of the following parts:
    • DOS header
    • DOS stub
    • PE header
    • Section header
    • Section 1
    • Section 2
    • . . .
    • Section n

    All structures given below can be found in the header file winnt.h.

    DOS header / stub

    The DOS header is only used for backwards compatibility. It precedes the DOS stub that normally just displays an error message about the program not being able to be run from DOS mode.

    Microsoft defines the DOS header as follows:

    typedef struct _IMAGE_DOS_HEADER {      // DOS .EXE header
        WORD   e_magic;                     // Magic number
        WORD   e_cblp;                      // Bytes on last page of file
        WORD   e_cp;                        // Pages in file
        WORD   e_crlc;                      // Relocations
        WORD   e_cparhdr;                   // Size of header in paragraphs
        WORD   e_minalloc;                  // Minimum extra paragraphs needed
        WORD   e_maxalloc;                  // Maximum extra paragraphs needed
        WORD   e_ss;                        // Initial (relative) SS value
        WORD   e_sp;                        // Initial SP value
        WORD   e_csum;                      // Checksum
        WORD   e_ip;                        // Initial IP value
        WORD   e_cs;                        // Initial (relative) CS value
        WORD   e_lfarlc;                    // File address of relocation table
        WORD   e_ovno;                      // Overlay number
        WORD   e_res[4];                    // Reserved words
        WORD   e_oemid;                     // OEM identifier (for e_oeminfo)
        WORD   e_oeminfo;                   // OEM information; e_oemid specific
        WORD   e_res2[10];                  // Reserved words
        LONG   e_lfanew;                    // File address of new exe header
    PE header

    The PE header contains informations about the different sections inside the executable that are used to store code and data or to define imports from other libraries or exports this libraries provides.

    It’s defined as follows:

    typedef struct _IMAGE_NT_HEADERS {
        DWORD Signature;
        IMAGE_FILE_HEADER FileHeader;
        IMAGE_OPTIONAL_HEADER32 OptionalHeader;
    The FileHeader describes the physical format of the file, i.e. contents, informations about symbols, etc:

    typedef struct _IMAGE_FILE_HEADER {
        WORD    Machine;
        WORD    NumberOfSections;
        DWORD   TimeDateStamp;
        DWORD   PointerToSymbolTable;
        DWORD   NumberOfSymbols;
        WORD    SizeOfOptionalHeader;
        WORD    Characteristics;
    The OptionalHeader contains informations about the logical format of the library, including required OS version, memory requirements and entry points:

    typedef struct _IMAGE_OPTIONAL_HEADER {
        // Standard fields.
        WORD    Magic;
        BYTE    MajorLinkerVersion;
        BYTE    MinorLinkerVersion;
        DWORD   SizeOfCode;
        DWORD   SizeOfInitializedData;
        DWORD   SizeOfUninitializedData;
        DWORD   AddressOfEntryPoint;
        DWORD   BaseOfCode;
        DWORD   BaseOfData;
        // NT additional fields.
        DWORD   ImageBase;
        DWORD   SectionAlignment;
        DWORD   FileAlignment;
        WORD    MajorOperatingSystemVersion;
        WORD    MinorOperatingSystemVersion;
        WORD    MajorImageVersion;
        WORD    MinorImageVersion;
        WORD    MajorSubsystemVersion;
        WORD    MinorSubsystemVersion;
        DWORD   Win32VersionValue;
        DWORD   SizeOfImage;
        DWORD   SizeOfHeaders;
        DWORD   CheckSum;
        WORD    Subsystem;
        WORD    DllCharacteristics;
        DWORD   SizeOfStackReserve;
        DWORD   SizeOfStackCommit;
        DWORD   SizeOfHeapReserve;
        DWORD   SizeOfHeapCommit;
        DWORD   LoaderFlags;
        DWORD   NumberOfRvaAndSizes;
    The DataDirectory contains 16 (IMAGE_NUMBEROF_DIRECTORY_ENTRIES) entries defining the logical components of the library:

    Index Description
    • 0 Exported functions
    • 1 Imported functions
    • 2 Resources
    • 3 Exception informations
    • 4 Security informations
    • 5 Base relocation table
    • 6 Debug informations
    • 7 Architecture specific data
    • 8 Global pointer
    • 9 Thread local storage
    • 10 Load configuration
    • 11 Bound imports
    • 12 Import address table
    • 13 Delay load imports
    • 14 COM runtime descriptor

    For importing the DLL we only need the entries describing the imports and the base relocation table. In order to provide access to the exported functions, the exports entry is required.

    Section header

    The section header is stored after the OptionalHeader structure in the PE header. Microsoft provides the macro IMAGE_FIRST_SECTION to get the start address based on the PE header.

    Actually, the section header is a list of informations about each section in the file:

    typedef struct _IMAGE_SECTION_HEADER {
        union {
                DWORD   PhysicalAddress;
                DWORD   VirtualSize;
        } Misc;
        DWORD   VirtualAddress;
        DWORD   SizeOfRawData;
        DWORD   PointerToRawData;
        DWORD   PointerToRelocations;
        DWORD   PointerToLinenumbers;
        WORD    NumberOfRelocations;
        WORD    NumberOfLinenumbers;
        DWORD   Characteristics;
    A section can contain code, data, relocation informations, resources, export or import definitions, etc.

    Loading the library

    To emulate the PE loader, we must first understand, which steps are neccessary to load the file to memory and prepare the structures so they can be called from other programs.

    When issuing the API call LoadLibrary, Windows basically performs these tasks:
    • Open the given file and check the DOS and PE headers.
    • Try to allocate a memory block of PEHeader.OptionalHeader.SizeOfImage bytes at position PEHeader.OptionalHeader.ImageBase.
    • Parse section headers and copy sections to their addresses. The destination address for each section, relative to the base of the allocated memory block, is stored in the VirtualAddress attribute of the IMAGE_SECTION_HEADER structure.
    • If the allocated memory block differs from ImageBase, various references in the code and/or data sections must be adjusted. This is called Base relocation.
    • The required imports for the library must be resolved by loading the corresponding libraries.
    • The memory regions of the different sections must be protected depending on the section’s characteristics. Some sections are marked as discardable and therefore can be safely freed at this point. These sections normally contain temporary data that is only needed during the import, like the informations for the base relocation.
    • Now the library is loaded completely. It must be notified about this by calling the entry point using the flag DLL_PROCESS_ATTACH.
      In the following paragraphs, each step is described.

    Allocate memory

    All memory required for the library must be reserved / allocated using VirtualAlloc, as Windows provides functions to protect these memory blocks. This is required to restrict access to the memory, like blocking write access to the code or constant data.

    The OptionalHeader structure defines the size of the required memory block for the library. It must be reserved at the address specified by ImageBase if possible:

    memory = VirtualAlloc((LPVOID)(PEHeader->OptionalHeader.ImageBase),
    If the reserved memory differs from the address given in ImageBase, base relocation as described below must be done.

    Copy sections

    Once the memory has been reserved, the file contents can be copied to the system. The section header must get evaluated in order to determine the position in the file and the target area in memory.

    Before copying the data, the memory block must get committed:

    dest = VirtualAlloc(baseAddress + section->VirtualAddress,
    Sections without data in the file (like data sections for the used variables) have a SizeOfRawData of 0, so you can use the SizeOfInitializedData or SizeOfUninitializedData of the OptionalHeader. Which one must get choosen depending on the bit flags IMAGE_SCN_CNT_INITIALIZED_DATA and IMAGE_SCN_CNT_UNINITIALIZED_DATA that may be set in the section`s characteristics.

    Base relocation

    All memory addresses in the code / data sections of a library are stored relative to the address defined by ImageBase in the OptionalHeader. If the library can’t be imported to this memory address, the references must get adjusted => relocated. The file format helps for this by storing informations about all these references in the base relocation table, which can be found in the directory entry 5 of the DataDirectory in the OptionalHeader.

    This table consists of a series of this structure

    ypedef struct _IMAGE_BASE_RELOCATION {
        DWORD   VirtualAddress;
        DWORD   SizeOfBlock;
    It contains (SizeOfBlock – IMAGE_SIZEOF_BASE_RELOCATION) / 2 entries of 16 bits each. The upper 4 bits define the type of relocation, the lower 12 bits define the offset relative to the VirtualAddress.

    The only types that seem to be used in DLLs are

    No operation relocation. Used for padding.
    Add the delta between the ImageBase and the allocated memory block to the 32 bits found at the offset.

    Resolve imports

    The directory entry 1 of the DataDirectory in the OptionalHeader specifies a list of libraries to import symbols from. Each entry in this list is defined as follows:

    typedef struct _IMAGE_IMPORT_DESCRIPTOR {
        union {
            DWORD   Characteristics;            // 0 for terminating null import descriptor
            DWORD   OriginalFirstThunk;         // RVA to original unbound IAT (PIMAGE_THUNK_DATA)
        DWORD   TimeDateStamp;                  // 0 if not bound,
                                                // -1 if bound, and real date\time stamp
                                                //     in IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT (new BIND)
                                                // O.W. date/time stamp of DLL bound to (Old BIND)
        DWORD   ForwarderChain;                 // -1 if no forwarders
        DWORD   Name;
        DWORD   FirstThunk;                     // RVA to IAT (if bound this IAT has actual addresses)
    The Name entry describes the offset to the NULL-terminated string of the library name (e.g. KERNEL32.DLL). The OriginalFirstThunk entry points to a list of references to the function names to import from the external library. FirstThunk points to a list of addresses that gets filled with pointers to the imported symbols.

    When we resolve the imports, we walk both lists in parallel, import the function defined by the name in the first list and store the pointer to the symbol in the second list:

    nameRef = (DWORD *)(baseAddress + importDesc->OriginalFirstThunk);
    symbolRef = (DWORD *)(baseAddress + importDesc->FirstThunk);
    for (; *nameRef; nameRef++, symbolRef++)
        PIMAGE_IMPORT_BY_NAME thunkData = (PIMAGE_IMPORT_BY_NAME)(codeBase + *nameRef);
        *symbolRef = (DWORD)GetProcAddress(handle, (LPCSTR)&thunkData->Name);
        if (*funcRef == 0)
    Protect memory

    Every section specifies permission flags in it’s Characteristics entry. These flags can be one or a combination of

    The section contains data that can be executed.
    The section contains data that is readable.
    The section contains data that is writeable.
    These flags must get mapped to the protection flags

    Now, the function VirtualProtect can be used to limit access to the memory. If the program tries to access it in a unauthorized way, an exception gets raised by Windows.

    In addition the section flags above, the following can be added:

    The data in this section can be freed after the import. Usually this is specified for relocation data.
    The data in this section must not get cached by Windows. Add the bit flag PAGE_NOCACHE to the protection flags above.

    Notify library

    The last thing to do is to call the DLL entry point (defined by AddressOfEntryPoint) and so notifying the library about being attached to a process.

    The function at the entry point is defined as

    typedef BOOL (WINAPI *DllEntryProc)(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpReserved);
    So the last code we need to execute is

    DllEntryProc entry = (DllEntryProc)(baseAddress + PEHeader->OptionalHeader.AddressOfEntryPoint);
    (*entry)((HINSTANCE)baseAddress, DLL_PROCESS_ATTACH, 0);
    Afterwards we can use the exported functions as with any normal library.

    Exported functions

    If you want to access the functions that are exported by the library, you need to find the entry point to a symbol, i.e. the name of the function to call.

    The directory entry 0 of the DataDirectory in the OptionalHeader contains informations about the exported functions. It’s defined as follows:

    typedef struct _IMAGE_EXPORT_DIRECTORY {
        DWORD   Characteristics;
        DWORD   TimeDateStamp;
        WORD    MajorVersion;
        WORD    MinorVersion;
        DWORD   Name;
        DWORD   Base;
        DWORD   NumberOfFunctions;
        DWORD   NumberOfNames;
        DWORD   AddressOfFunctions;     // RVA from base of image
        DWORD   AddressOfNames;         // RVA from base of image
        DWORD   AddressOfNameOrdinals;  // RVA from base of image
    First thing to do, is to map the name of the function to the ordinal number of the exported symbol. Therefore, just walk the arrays defined by AddressOfNames and AddressOfNameOrdinals parallel until you found the required name.

    Now you can use the ordinal number to read the address by evaluating the n-th element of the AddressOfFunctions array.

    Freeing the library

    To free the custom loaded library, perform the steps

    Call entry point to notify library about being detached:
    DllEntryProc entry = (DllEntryProc)(baseAddress + PEHeader->OptionalHeader.AddressOfEntryPoint);
    (*entry)((HINSTANCE)baseAddress, DLL_PROCESS_ATTACH, 0);
    Free external libraries used to resolve imports.
    Free allocated memory.


    MemoryModule is a C-library that can be used to load a DLL from memory.

    The interface is very similar to the standard methods for loading of libraries:

    typedef void *HMEMORYMODULE;
    HMEMORYMODULE MemoryLoadLibrary(const void *);
    FARPROC MemoryGetProcAddress(HMEMORYMODULE, const char *);
    void MemoryFreeLibrary(HMEMORYMODULE);

  2. #2
    Senior Member The_USDL is on a distinguished road The_USDL's Avatar
    Join Date
    2011 Oct
    Thanked 538 Times in 47 Posts
    Rep Power


    Attached Files

  3. The Following User Says Thank You to The_USDL For This Useful Post:

  4. #3
    Senior Member The_USDL is on a distinguished road The_USDL's Avatar
    Join Date
    2011 Oct
    Thanked 538 Times in 47 Posts
    Rep Power


    #include <Windows.h>
    typedef void *HMEMORYMODULE;
    #ifdef __cplusplus
    extern "C" {
    HMEMORYMODULE MemoryLoadLibrary(const void *);
    FARPROC MemoryGetProcAddress(HMEMORYMODULE, const char *);
    void MemoryFreeLibrary(HMEMORYMODULE);
    #ifdef __cplusplus
    #endif  // __MEMORY_MODULE_HEADER

Similar Threads

  1. [C++] Memory Hacking with C and CheatEngine, writing to Process Memory
    By Grooguz in forum Programming Tutorials
    Replies: 7
    Last Post: 2013-10-12, 07:15 PM
  2. Replies: 20
    Last Post: 2011-10-02, 06:57 AM
  3. Memory Pattern Scanning, Video Tutorial
    By Dwar in forum Programming Tutorials
    Replies: 0
    Last Post: 2010-11-29, 02:59 PM
  4. [Memory Scanner] Memory Hacking Software
    By Dwar in forum Files & Tools
    Replies: 3
    Last Post: 2010-11-29, 02:39 PM
  5. [Tutorial] Hacking Applications With Memory Editors
    By Dwar in forum Game Researching Tutorials
    Replies: 0
    Last Post: 2010-11-05, 07:30 AM
Visitors found this page by searching for:

Delphi DLL Trainer

dll memory scanner

delphi load dll from memory

load dll from memory

delphi load dll from filememory

windows load dll from memory

memory scan delphi

memory dll loader

load dll in mem

dll base relocation delphi

delphi load dll from memeory

delphi load dll in memory

load picture from dll files delphi

delphi dll image base

c load dll from resource

scanning dll delphi

delphi for .net tutorial load DLL

delete dll on detach delphi


delphi memory scan

delphi memory scanner dll

pe header baserelocation

windows dll mem loading

scan memory of loaded dlls

delete .dll on process detach c


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts