I think some of you will find this interesting. While reading up on LoadLibraryEx, I noticed an interesting flag: LOAD_IGNORE_CODE_AUTHZ_LEVEL From MSDN: I just did a SRP test to confirm this: A couple of years ago, I build a spreadsheet that creates a DLL in a temporary folder and then loads it. With the appropriate SRP or AppLocker configuration, this can be prevented (and bypassed again, but that's another story...). I configured SRP to whitelist DLLs, so my spreadsheet didn't work anymore. Until I used LoadLibraryEx in stead of LoadLibrary like this: Code: Private Declare Function LoadLibraryEx Lib "KERNEL32" Alias "LoadLibraryExA" (ByVal strFileName As String, ByVal hFile As Long, ByVal dwFlags As Long) As Long ... hLibrary = LoadLibraryEx(file, 0, 16) 16 is the value of flag LOAD_IGNORE_CODE_AUTHZ_LEVEL. Thanks to a feature Microsoft included by design, I can circumvent SRP and load my DLL. I have to test AppLocker too, but I expect this to work too per the MSDN doc.