Cannot Load Php5ts Dll Fixer

Posted on by
Dynamic link library
Filename extension.dll
Internet media typeapplication/
Uniform Type Identifier (UTI)
Magic numberMZ
Developed byMicrosoft
Container forShared library

Dynamic-link library (DLL) is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2operating systems. These libraries usually have the file extensionDLL, OCX (for libraries containing ActiveX controls), or DRV (for legacy system drivers).The file formats for DLLs are the same as for Windows EXE files – that is, Portable Executable (PE) for 32-bit and 64-bit Windows, and New Executable (NE) for 16-bit Windows. As with EXEs, DLLs can contain code, data, and resources, in any combination.

Data files with the same file format as a DLL, but with different file extensions and possibly containing only resource sections, can be called resource DLLs. Examples of such DLLs include icon libraries, sometimes having the extension ICL, and font files, having the extensions FON and FOT.[1]

  • 2Features
  • 3Compiler and language considerations
  • 4Programming examples
    • 4.2Using explicit run-time linking

Thanks for your input Richard. The version of Windows I was working on was a server edition, so you may be right that you need more dependencies. The architecture distinction. This is a large topic but in short; PCs come in two variants, 32bit and 64bit (also signified by x86 and x64 respectively). 32bit PCs use only 32bit programs, and DLL files, while 64bit can use both 64bit and 32bit programs and files. PHP5 Apache2 Handler load bad php5ts.dll - posted in PHP: Hi, I use UniformServer for use at home, at office, at different locations. This is obviously NOT a fix. Topic: Apache 2.2 w/ PHP 5.1 or 4.4 -- Cannot load php5apache2.dll (Read 66501 times). PHPINIDir problem with php5.1 fix. /Utilities/Apache Server 2.2/php5. If a DLL fails to load there can be numerous reasons for the error, listed below are the most common. The DLL or referenced DLL is not in a directory specified in the path. The DLL references another DLL that is not present.


The first versions of Microsoft Windows ran programs together in a single address space. Every program was meant to co-operate by yielding the CPU to other programs so that the graphical user interface (GUI) could multitask and be maximally responsive. All operating-system level operations were provided by the underlying operating system: MS-DOS. All higher-level services were provided by Windows Libraries 'Dynamic Link Library'. The Drawing API, Graphics Device Interface (GDI), was implemented in a DLL called GDI.EXE, the user interface in USER.EXE. These extra layers on top of DOS had to be shared across all running Windows programs, not just to enable Windows to work in a machine with less than a megabyte of RAM, but to enable the programs to co-operate with each other. The code in GDI needed to translate drawing commands to operations on specific devices. On the display, it had to manipulate pixels in the frame buffer. When drawing to a printer, the API calls had to be transformed into requests to a printer. Although it could have been possible to provide hard-coded support for a limited set of devices (like the Color Graphics Adapter display, the HP LaserJet Printer Command Language), Microsoft chose a different approach. GDI would work by loading different pieces of code, called 'device drivers', to work with different output devices.

The same architectural concept that allowed GDI to load different device drivers is that which allowed the Windows shell to load different Windows programs, and for these programs to invoke API calls from the shared USER and GDI libraries. That concept was 'dynamic linking'.

In a conventional non-shared 'static' library, sections of code are simply added to the calling program when its executable is built at the 'linking' phase; if two programs call the same routine, the routine is included in both the programs during the linking stage of the two. With dynamic linking, shared code is placed into a single, separate file. The programs that call this file are connected to it at run time, with the operating system (or, in the case of early versions of Windows, the OS-extension), performing the binding.

For those early versions of Windows (1.0 to 3.11), the DLLs were the foundation for the entire GUI. As such, display drivers were merely DLLs with a .DRV extension that provided custom implementations of the same drawing API through a unified device driver interface (DDI), and the Drawing (GDI) and GUI (USER) APIs were merely the function calls exported by the GDI and USER, system DLLs with .EXE extension.

This notion of building up the operating system from a collection of dynamically loaded libraries is a core concept of Windows that persists as of 2015.DLLs provide the standard benefits of shared libraries, such as modularity. Modularity allows changes to be made to code and data in a single self-contained DLL shared by several applications without any change to the applications themselves.

Another benefit of modularity is the use of generic interfaces for plug-ins. A single interface may be developed which allows old as well as new modules to be integrated seamlessly at run-time into pre-existing applications, without any modification to the application itself. This concept of dynamic extensibility is taken to the extreme with the Component Object Model, the underpinnings of ActiveX.

In Windows 1.x, 2.x and 3.x, all Windows applications shared the same address space as well as the same memory. A DLL was only loaded once into this address space; from then on, all programs using the library accessed it. The library's data was shared across all the programs. This could be used as an indirect form of inter-process communication, or it could accidentally corrupt the different programs. With the introduction of 32-bit libraries in Windows 95 every process ran in its own address space. While the DLL code may be shared, the data is private except where shared data is explicitly requested by the library. That said, large swathes of Windows 95, Windows 98 and Windows Me were built from 16-bit libraries, which limited the performance of the Pentium Pro microprocessor when launched, and ultimately limited the stability and scalability of the DOS-based versions of Windows.

Although DLLs are the core of the Windows architecture, they have several drawbacks, collectively called 'DLL hell'.[2]As of 2015 Microsoft promotes .NET Framework as one solution to the problems of DLL hell, although they now promote virtualization-based solutions such as Microsoft Virtual PC and Microsoft Application Virtualization, because they offer superior isolation between applications. An alternative mitigating solution to DLL hell has been to implement side-by-side assembly.


Since DLLs are essentially the same as EXEs, the choice of which to produce as part of the linking process is for clarity, since it is possible to export functions and data from either.

It is not possible to directly execute a DLL, since it requires an EXE for the operating system to load it through an entry point, hence the existence of utilities like RUNDLL.EXE or RUNDLL32.EXE which provide the entry point and minimal framework for DLLs that contain enough functionality to execute without much support.

DLLs provide a mechanism for shared code and data, allowing a developer of shared code/data to upgrade functionality without requiring applications to be re-linked or re-compiled. From the application development point of view Windows and OS/2 can be thought of as a collection of DLLs that are upgraded, allowing applications for one version of the OS to work in a later one, provided that the OS vendor has ensured that the interfaces and functionality are compatible.

DLLs execute in the memory space of the calling process and with the same access permissions which means there is little overhead in their use but also that there is no protection for the calling EXE if the DLL has any sort of bug.

Memory management[edit]

In Windows API, the DLL files are organized into sections. Each section has its own set of attributes, such as being writable or read-only, executable (for code) or non-executable (for data), and so on.

The code in a DLL is usually shared among all the processes that use the DLL; that is, they occupy a single place in physical memory, and do not take up space in the page file. If the physical memory occupied by a code section is to be reclaimed, its contents are discarded, and later reloaded directly from the DLL file as necessary.

In contrast to code sections, the data sections of a DLL are usually private; that is, each process using the DLL has its own copy of all the DLL's data. Optionally, data sections can be made shared, allowing inter-process communication via this shared memory area. However, because user restrictions do not apply to the use of shared DLL memory, this creates a security hole; namely, one process can corrupt the shared data, which will likely cause all other sharing processes to behave undesirably. For example, a process running under a guest account can in this way corrupt another process running under a privileged account. This is an important reason to avoid the use of shared sections in DLLs.

If a DLL is compressed by certain executable packers (e.g. UPX), all of its code sections are marked as read and write, and will be unshared. Read-and-write code sections, much like private data sections, are private to each process. Thus DLLs with shared data sections should not be compressed if they are intended to be used simultaneously by multiple programs, since each program instance would have to carry its own copy of the DLL, resulting in increased memory consumption.

Import libraries[edit]

Like static libraries, import libraries for DLLs are noted by the .lib file extension. For example, kernel32.dll, the primary dynamic library for Windows' base functions such as file creation and memory management, is linked via kernel32.lib.

Linking to dynamic libraries is usually handled by linking to an import library when building or linking to create an executable file. The created executable then contains an import address table (IAT) by which all DLL function calls are referenced (each referenced DLL function contains its own entry in the IAT). At run-time, the IAT is filled with appropriate addresses that point directly to a function in the separately loaded DLL.

Symbol resolution and binding[edit]

Each function exported by a DLL is identified by a numeric ordinal and optionally a name. Likewise, functions can be imported from a DLL either by ordinal or by name. The ordinal represents the position of the function's address pointer in the DLL Export Address table. It is common for internal functions to be exported by ordinal only. For most Windows API functions only the names are preserved across different Windows releases; the ordinals are subject to change. Thus, one cannot reliably import Windows API functions by their ordinals.

Importing functions by ordinal provides only slightly better performance than importing them by name: export tables of DLLs are ordered by name, so a binary search can be used to find a function. The index of the found name is then used to look up the ordinal in the Export Ordinal table. In 16-bit Windows, the name table was not sorted, so the name lookup overhead was much more noticeable.

It is also possible to bind an executable to a specific version of a DLL, that is, to resolve the addresses of imported functions at compile-time. For bound imports, the linker saves the timestamp and checksum of the DLL to which the import is bound. At run-time Windows checks to see if the same version of library is being used, and if so, Windows bypasses processing the imports. Otherwise, if the library is different from the one which was bound to, Windows processes the imports in a normal way.

Bound executables load somewhat faster if they are run in the same environment that they were compiled for, and exactly the same time if they are run in a different environment, so there's no drawback for binding the imports. For example, all the standard Windows applications are bound to the system DLLs of their respective Windows release. A good opportunity to bind an application's imports to its target environment is during the application's installation. This keeps the libraries 'bound' until the next OS update. It does, however, change the checksum of the executable, so it is not something that can be done with signed programs, or programs that are managed by a configuration management tool that uses checksums (such as MD5 checksums) to manage file versions. As more recent Windows versions have moved away from having fixed addresses for every loaded library (for security reasons), the opportunity and value of binding an executable is decreasing.

Explicit run-time linking[edit]

DLL files may be explicitly loaded at run-time, a process referred to simply as run-time dynamic linking by Microsoft, by using the LoadLibrary (or LoadLibraryEx) API function. The GetProcAddress API function is used to look up exported symbols by name, and FreeLibrary – to unload the DLL. These functions are analogous to dlopen, dlsym, and dlclose in the POSIX standard API.

The procedure for explicit run-time linking is the same in any language that supports pointers to functions, since it depends on the Windows API rather than language constructs.

Delayed loading[edit]


Normally, an application that is linked against a DLL’s import library will fail to start if the DLL cannot be found, because Windows will not run the application unless it can find all of the DLLs that the application may need. However an application may be linked against an import library to allow delayed loading of the dynamic library.[3]In this case the operating system will not try to find or load the DLL when the application starts; instead, a stub is included in the application by the linker which will try to find and load the DLL through LoadLibrary and GetProcAddress when one of its functions is called. If the DLL cannot be found or loaded, or the called function does not exist, the application will generate an exception, which may be caught and handled appropriately. If the application does not handle the exception, it will be caught by the operating system, which will terminate the program with an error message.

The delay-loading mechanism also provides notification hooks, allowing the application to perform additional processing or error handling when the DLL is loaded and/or any DLL function is called.

Compiler and language considerations[edit]


In a source file, the keyword library is used instead of program. At the end of the file, the functions to be exported are listed in exports clause.

Delphi does not need LIB files to import functions from DLLs; to link to a DLL, the external keyword is used in the function declaration to signal the DLL name, followed by name to name the symbol (if different) or index to identify the index.

Microsoft Visual Basic[edit]

In Visual Basic (VB), only run-time linking is supported; but in addition to using LoadLibrary and GetProcAddress API functions, declarations of imported functions are allowed.

When importing DLL functions through declarations, VB will generate a run-time error if the DLL file cannot be found. The developer can catch the error and handle it appropriately.

When creating DLLs in VB, the IDE will only allow you to create ActiveX DLLs, however methods have been created[4] to allow the user to explicitly tell the linker to include a .DEF file which defines the ordinal position and name of each exported function. Software reset printer hp 1050. This allows the user to create a standard Windows DLL using Visual Basic (Version 6 or lower) which can be referenced through a 'Declare' statement.

C and C++[edit]

Microsoft Visual C++ (MSVC) provides several extensions to standard C++ which allow functions to be specified as imported or exported directly in the C++ code; these have been adopted by other Windows C and C++ compilers, including Windows versions of GCC. These extensions use the attribute __declspec before a function declaration. Note that when C functions are accessed from C++, they must also be declared as extern 'C' in C++ code, to inform the compiler that the C linkage should be used.[5]

Besides specifying imported or exported functions using __declspec attributes, they may be listed in IMPORT or EXPORTS section of the DEF file used by the project. The DEF file is processed by the linker, rather than the compiler, and thus it is not specific to C++.

DLL compilation will produce both DLL and LIB files. The LIB file is used to link against a DLL at compile-time; it is not necessary for run-time linking. Unless your DLL is a Component Object Model (COM) server, the DLL file must be placed in one of the directories listed in the PATH environment variable, in the default system directory, or in the same directory as the program using it. COM server DLLs are registered using regsvr32.exe, which places the DLL's location and its globally unique ID (GUID) in the registry. Programs can then use the DLL by looking up its GUID in the registry to find its location or create an instance of the COM object indirectly using its class identifier and interface identifier.

Programming examples[edit]

Using DLL imports[edit]

The following examples show how to use language-specific bindings to import symbols for linking against a DLL at compile-time.



Make sure you include Example.lib file (assuming that Example.dll is generated) in the project (Add Existing Item option for Project!) before static linking. The file Example.lib is automatically generated by the compiler when compiling the DLL. Not executing the above statement would cause linking error as the linker would not know where to find the definition of AddNumbers. You also need to copy the DLL Example.dll to the location where the .exe file would be generated by the following code.

Using explicit run-time linking[edit]

The following examples show how to use the run-time loading and linking facilities using language-specific Windows API bindings.


Microsoft Visual Basic[edit]

Warning: the following code is vulnerable, it doesn't conform to Microsoft's guidance for safe library loading!


Warning: the following code is vulnerable, it doesn't conform to Microsoft's guidance for safe library loading!


Warning: the following code is vulnerable; it doesn't conform to Microsoft's guidance for safe library loading.


Warning: the following code is vulnerable; it doesn't conform to Microsoft's guidance for safe library loading!

Component Object Model[edit]

The Component Object Model (COM) defines a binary standard to host the implementation of objects in DLL and EXE files. It provides mechanisms to locate and version those files as well as a language-independent and machine-readable description of the interface. Hosting COM objects in a DLL is more lightweight and allows them to share resources with the client process. This allows COM objects to implement powerful back-ends to simple GUI front ends such as Visual Basic and ASP. They can also be programmed from scripting languages.[6]

DLL hijacking[edit]

Due to a vulnerability commonly known as DLL hijacking, DLL spoofing, DLL preloading or binary planting, many programs will load and execute a malicious DLL contained in the same folder as a data file opened by these programs.[7][8][9][10] The vulnerability was discovered by Georgi Guninski in 2000.[11]In August 2010 it gained worldwide publicity after ACROS security rediscovered it again and many hundreds of programs were found vulnerable.[12]Programs that are run from unsafe locations, i.e. user-writable folders like the Downloads or the Temp directory, are almost always susceptible to this vulnerability.[13][14][15][16][17][18][19]

See also[edit]

  • Dependency Walker, a utility which displays exported and imported functions of DLL and EXE files


  • Hart, Johnson. Windows System Programming Third Edition. Addison-Wesley, 2005. ISBN0-321-25619-0.
  • Rector, Brent et al. Win32 Programming. Addison-Wesley Developers Press, 1997. ISBN0-201-63492-9.

External links[edit]

  • dllexport, dllimport on MSDN
  • Dynamic-Link Libraries on MSDN
  • Dynamic-Link Library Security on MSDN
  • Dynamic-Link Library Search Order on MSDN
  • What is a DLL? on Microsoft support site
  • Dynamic-Link Library Functions on MSDN
  1. ^Microsoft Corporation. 'Creating a Resource-Only DLL'. Microsoft Developer Network Library.
  2. ^'The End of DLL Hell'. Microsoft Corporation. Archived from the original on 2008-05-06. Retrieved 2009-07-11.
  3. ^'Linker Support for Delay-Loaded DLLs'. Microsoft Corporation. Retrieved 2009-07-11.
  4. ^Petrusha, Ron (2005-04-26). 'Creating a Windows DLL with Visual Basic'. O'Reilly Media. Retrieved 2009-07-11.
  5. ^MSDN, Using extern to Specify Linkage
  6. ^Satran, Michael. 'Component Object Model (COM)'.
  7. ^DLL Spoofing in Windows
  8. ^'DLL Preloading Attacks'. Retrieved 25 March 2018.
  9. ^'More information about the DLL Preloading remote attack vector'. Retrieved 25 March 2018.
  10. ^'An update on the DLL-preloading remote attack vector'. Retrieved 25 March 2018.
  11. ^'Double clicking on MS Office documents from Windows Explorer may execute arbitrary programs in some cases'. Retrieved 25 March 2018.
  12. ^'Binary Planting - The Official Web Site of a Forgotten Vulnerability . ACROS Security'. Retrieved 25 March 2018.
  13. ^Carpet Bombing and Directory Poisoning
  14. ^'Dev to Mozilla: Please dump ancient Windows install processes'. Retrieved 25 March 2018.
  15. ^'Gpg4win - Security Advisory Gpg4win 2015-11-25'. Retrieved 25 March 2018.
  16. ^'McAfee KB - McAfee Security Bulletin: Security patch for several McAfee installers and uninstallers (CVE-2015-8991, CVE-2015-8992, and CVE-2015-8993) (TS102462)'. Retrieved 25 March 2018.
  17. ^'fsc-2015-4 - F-Secure Labs'. Retrieved 25 March 2018.
  18. ^'ScanNow DLL Search Order Hijacking Vulnerability and Deprecation'. 21 December 2015. Retrieved 25 March 2018.
  19. ^Team, VeraCrypt. 'oss-sec: CVE-2016-1281: TrueCrypt and VeraCrypt Windows installers allow arbitrary code execution with elevation of privilege'. Retrieved 25 March 2018.
Retrieved from ''
Over the weekend we upgraded some servers with Windows updates and now our PHP pages won't connect to our SQL Server 2008 R2 database. The pages were originally programmed with mssql_connect() and that function is now an undefined function. I have read somewhere that mssql_connect() no longer works after a certain update, so I am going to recode the few php pages that we still have using sqlsrv_connect(). My problem is, I cannot find the correct dlls to use in out setup.
Our setup consists of:
PHP 5.2.9-2 on a 32-bit server
IIS (which I think means VC9)
SQL Server 2008 R2 on a 64-bit server
I don't see the proper dll to use for sqlsrv_connect()
When using php_sqlsrv_52_ts_vc6.dll iis will reset properly and sqlsrv_connect() doesn't throw an error. However, the connection won't establish and I get the following error:
Array ( [0] => Array ( [0] => IMSSP [SQLSTATE] => IMSSP [1] => -49 code => -49 [2] => This extension requires either the Microsoft SQL Server 2008 Native Client (SP1 or later) or the Microsoft SQL Server 2008 R2 Native Client ODBC Driver to communicate with SQL Server. Neither of those ODBC Drivers are currently installed. Access the following URL to download the Microsoft SQL Server 2008 R2 Native Client ODBC driver for x86: [message] => This extension requires either the Microsoft SQL Server 2008 Native Client (SP1 or later) or the Microsoft SQL Server 2008 R2 Native Client ODBC Driver to communicate with SQL Server. Neither of those ODBC Drivers are currently installed. Access the following URL to download the Microsoft SQL Server 2008 R2 Native Client ODBC driver for x86: ) [1] => Array ( [0] => IM002 [SQLSTATE] => IM002 [1] => 0 code => 0 [2] => [Microsoft][ODBC Driver Manager] Data source name not found and no default driver specified [message] => [Microsoft][ODBC Driver Manager] Data source name not found and no default driver specified ) )
When adding php_pdo_sqlsrv_52_ts_vc6.dll to the php_sqlsrv_52_ts_vc6.dll, I get the error:
Cannot load module 'pdo_sqlsrv' because required module 'pdo' is not loaded in Unknown on line 0
If I try php_sqlsrv_53_ts_vc9.dll, I get:
the sqlsrv_connect() is an undefined function.
PHP Startup: sqlsrv: Unable to initialize module
Module compiled with module API=20090626, debug=0, thread-safety=1

Php5ts.dll Error

PHP compiled with module API=20060613, debug=0, thread-safety=1
These options need to match in Unknown on line 0.


Do I need to upgrade PHP to 5.3? Is there another way to connect to a SQL Server database other than sqlsrv_connect() or mssql_connect()? If I upgrade to 5.3 on PHP, is there an easy step-by-step process? Anything I should be aware of?