You can open a PE image as a dump file with WinDbg

There is a little known feature of WinDbg, ntsd, cdb, kd, and anything else that uses DbgEng to open dump files.

It turns out that with anything powered by DbgEng, anywhere where you could open a dump file (user dump, kernel dump, etc), you can instead open a PE image (.exe/.dll/.sys/etc) and have the debugger treat it as a dump containing just the contents of the selected PE image.

This is actually a relatively useful feature. When you open a PE image as a dump file, the debugger maps it as an image as if it were loaded in-memory as executable code (though it doesn’t actually run any code, just maps it as if it were an executable and not a data file). This gets you an in-memory representation of your exe/dll/sys/other PE file as if you were debugging a live process (or a dump) that had the image in question loaded.

Like a dump debugging session, this is essentially a read-only session; you can’t really modify anything, as there is no target to control. Additionally, there is no real register context either (or stack or heap), although things like initialized and zero filled global variables and executable code belonging to the module will be in-memory. (The preferred image base for the module is used in this situation for basing the requested PE module in the virtual address space constructed for the debugging session.)

After you have loaded the target, you can do anything that you would normally do with a dump for the most part, as far as examining symbols and disassembling the target go. If you need a disassembler with symbol support and can’t start a process or whatnot to contain a PE image, this particular trick is a great quick-n-dirty replacement for a more full-featured disassembler program.

Note that a side effect of opening a PE image in dump mode is that the symbol server is used to retrieve the binary (which might seem a bit strange, until you consider that for dump files, the normal case is that you don’t have the entire binary saved in memory; just enough header information to retrieve the binary from the symbol server). Therefore, make sure that your symbol path is setup correctly before trying this particular trick.

3 Responses to “You can open a PE image as a dump file with WinDbg”

  1. Alex Ionescu says:

    You can also load a .PDB directly and explore the types/symbols inside it.

    Another great think is that by using the functionality you mentionned, you can actually load a driver in user-mode. Doron blogged about this here: http://blogs.msdn.com/doronh/archive/2006/03/10/549036.aspx

  2. strik says:

    This feature can be used for looking at a disassembly of a PE which belongs to an architecture you do not own. That is, you can load an i64 or AMD64 binary on an i386 machine, if you want to peek into it.

    – Spiro.

  3. Skywing says:

    Yes – you get the full benefits of the cross-platform debuggability that DbgEng provides for .dmp files.