Verifying Silk Performer DLL injection with Process Explorer.

Verifying Silk Performer DLL injection with Process Explorer.

In order to capture traffic from an application, Silk Performer will attempt to inject DLLs into the application under test.

DLL injection can often be stopped by security and antivirus software. When this happens, Silk Performer cannot capture the traffic and zero functions will be recorded.

We can check if Silk Performers DLL injection has been successful by using a tool from Microsoft called Process Explorer.

In this instance, Process Explorer is on the c:\ drive.

First we start recording the application with Silk Performer, in this case Firefox.

Next we launch Process Explorer from the command line.

After Process Explorer opens, we scroll down to find Firefox and click on the entry.

In the bottom pane we see a list of the DLLs currently being used with the application and the Company which owns them.

Here we see the 3 Silk Performer DLLs, all owned by 'Borland Software Corporation'.

In summary, if any of these DLLs are missing and the recorder is not picking up traffic, the most likely cause is security software.


Some content on Community Tips & Information pages is not officially supported by Micro Focus. Please refer to our Terms of Use for more detail.
Top Contributors
Version history
Revision #:
1 of 1
Last update:
‎2014-04-16 15:59
Updated by:
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.