in Education by
I need to validate that an executable's dependencies exist and if possible, the correct version of that dependency. Including the dependency's dependencies. Using dumpbin.exe, I am able to gather an exe or dll's dependencies. For example C:\Program Files (x86)\Microsoft Visual Studio 14.0\VC\bin>dumpbin.exe /dependents "C:\Program Files (x86)\Notepad++\notepad++.exe" Microsoft (R) COFF/PE Dumper Version 14.00.24215.1 Copyright (C) Microsoft Corporation. All rights reserved. Dump of file C:\Program Files (x86)\Notepad++\notepad++.exe File Type: EXECUTABLE IMAGE Image has the following dependencies: COMCTL32.dll SHLWAPI.dll SHELL32.dll KERNEL32.dll USER32.dll GDI32.dll COMDLG32.dll ADVAPI32.dll ole32.dll Summary 20000 .data 52000 .rdata 13000 .reloc 86000 .rsrc 10F000 .text I am reading the output of dumpbin.exe via Process.Start() in C# and parsing the return data, no problem. I can also validate if a file exists, easy... However, it is entirely possible that more than one of a dependency's dependencies exist on a system. How would you validate the existence of the correct dependency or version of said dependency?? This becomes important as validating the dependency's dependencies also exist. It would be nice if there was a way to get above as "C:\Windows\System32\ole32.dll" Any thoughts to this? Thanks in advance! (PS- if I have this completely wrong in terms of dll locations, like it can only live in the .exe's executing path or system32, please tell me, thanks) JavaScript questions and answers, JavaScript questions pdf, JavaScript question bank, JavaScript questions and answers pdf, mcq on JavaScript pdf, JavaScript questions and solutions, JavaScript mcq Test , Interview JavaScript questions, JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)

1 Answer

0 votes
by
The load order for multiple libraries on the node you are testing affects which library. Runtime methods are: Use sysinternals procmon loaded dependencies. Use windbg by launching the program from windbg to see loader messages.

Related questions

0 votes
    Did existence of lyapunov function is necessary for stability? (a) yes (b) no This question was posed to ... Synaptic Dynamics of Neural Networks Please answer the above question....
asked Sep 5, 2022 in Education by JackTerrance
0 votes
    State wheather the following statements are true or false. Give reasons for your answer. Consumer movement came into existence. Please answer the above question....
asked Aug 14, 2022 in Education by JackTerrance
0 votes
    The principle of peaceful co-existence was put forth by ___________ (Eisenhower, Joseph Stalin, Khrushchev, Jawaharlal Nehru) Please answer the above question....
asked Aug 4, 2022 in Education by JackTerrance
0 votes
    I have a company table and I want to check the existence of multiple column to remove them. class ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked May 6, 2022 in Education by JackTerrance
0 votes
    I want something like an std::map, but I only want to see if the item exists or not, I don' ... , JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 12, 2022 in Education by JackTerrance
0 votes
    Read the paragraph and answer the questions given below: Reproduction is the process by which the living species ... higher organisms? Select the correct answer from above options...
asked Nov 9, 2021 in Education by JackTerrance
0 votes
    The reason for non existence of magnetic monopoles is (a) The magnetic field cannot be split ... proposed by,electromagnetic theory engineering physics,electromagnetic theory nptel...
asked Nov 6, 2021 in Education by JackTerrance
0 votes
    The non existence of the magnetic monopole is due to which operation? (a) Gradient (b) ... proposed by,electromagnetic theory engineering physics,electromagnetic theory nptel...
asked Nov 6, 2021 in Education by JackTerrance
0 votes
    From where the term hacker' first came to existence? (a) MIT (b) Stanford University (c) California (d) ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Existence of weakness in a system or network is called _______ (a) Threat (b) Vulnerability (c) Exploit (d) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In which year India's IT Act came into existence? (a) 2000 (b) 2001 (c) 2002 (d) 2003 The question was ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In which year Apple II virus came into existence? (a) 1979 (b) 1980 (c) 1981 (d) 1982 I got ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In mid-1981, the 1^st virus for Apple computers with the name _________ came into existence. (a) Apple ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    I'm working on a C# program that uses iTextSharp.dll and WebCam_Capture.dll. When I build the program, ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Jun 18, 2022 in Education by JackTerrance
0 votes
    I am trying to retrieve a particular file from multiple FTP servers. those server details are stored in ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Jun 18, 2022 in Education by JackTerrance
...