I recently had to debug a .NET 4.0 process which was loading the dependent assemblies using the AppDomain.AssemblyResolve event. The dependent assemblies were stored within the executable. I couldn’t disassemble the code to look for the dependent assembly because the exe was obfuscated. FYI the dynamic assembly cannot be saved using !SaveModule and here is the reason for this read the comments especially from Evian. Unlike psscor2.dll the sos for .NET 4.0 does not have a !dumpdynamicassembly with a save option.
Here is the sample code to demonstrate this.
int s = new int;
int v = 100;
static void Main(string args1)
AppDomain.CurrentDomain.AssemblyResolve += (sender, args) =>
String resourceName = "ConsoleApplication13." +new AssemblyName(args.Name).Name + ".dll";
using (var stream = Assembly.GetExecutingAssembly().GetManifestResourceStream(resourceName))
Byte assemblyData = new Byte[stream.Length];
stream.Read(assemblyData, 0, assemblyData.Length);
System.IO.File.Delete(@"C:\Users\naveen\Documents\Visual Studio 2010\Projects\ConsoleApplication13\bin\Debug\TestLib.dll");
var s = new Foo1();
I knew the Assembly had to be loaded using System.Reflection.Assembly.Load(Byte) ,so ended setting a break-point on the method using command !mbm *Assembly.Load* on the launch of the executable.
Here are the output of args and local variables for the above break-point
Frame 0x0: (System.Reflection.Assembly.Load(Byte)):
Notice the “rawAssembly” argument which has the assembly contents. Here are the raw memory contents of the address using dd 0x025fc374
0:000> dd 0x025fc374
025fc374 6a764994 00001000 00905a4d 00000003
025fc384 00000004 0000ffff 000000b8 00000000
025fc394 00000040 00000000 00000000 00000000
025fc3a4 00000000 00000000 00000000 00000000
025fc3b4 00000000 00000080 0eba1f0e cd09b400
025fc3c4 4c01b821 685421cd 70207369 72676f72
025fc3d4 63206d61 6f6e6e61 65622074 6e757220
025fc3e4 206e6920 20534f44 65646f6d 0a0d0d2e
- 6a764994 :- Is the Array’s Method Table
- 00001000 : – Is the Array size
- The rest are the array contents.
Unlike the reference type arrays, the value type arrays don’t have a DWORD for Method table of its contents. With this information I could dump the contents from memory in to disk using .writemem command.
.writemem c:\temp\assembly.bin @ecx+8 L?(poi(@ecx+@$ptrsize)*@$ptrsize)
In x86 @ecx register contains argument for rawAssembly. The @ecx+8 is the start position of the first byte and that is the reason for using this as the start position for .writemem. The poi(@ecx+@$ptrsize) contains the array size which in our case is 0001000 and multiply it by @$ptrsize which is 4 in x86. The expression (poi(@ecx+@$ptrsize)*@$ptrsize) would in our case result to 4000 bytes.
The assembly.bin would contain data in hex format which has to be converted in to binary format. Here is the code to convert from Hex to Binary format.