| filename | mngview.exe | |
|---|---|---|
| size | 103424 (0x19400) | |
| md5 | 2788776d93e15b2007d8565a22ddd17e | |
| type | PE32 executable (GUI) Intel 80386, for MS Windows | |
| mimetype | application/x-dosexec | |
| clamav | scan pending | |
| virustotal | → scan with virustotal.com | |
| histogram | ||
MZ Header
| signature | MZ |
| bytes_in_last_block | 0x50 |
| blocks_in_file | 2 |
| num_relocs | 0 |
| header_paragraphs | 4 |
| min_extra_paragraphs | 0xf |
| max_extra_paragraphs | 0xffff |
| ss | 0 |
| sp | 0xb8 |
| checksum | 0 |
| ip | 0 |
| cs | 0 |
| reloc_table_offset | 0x40 |
| overlay_number | 0x1a |
| reserved0 | 0 |
| oem_id | 0 |
| oem_info | 0 |
| reserved2 | 0 |
| reserved3 | 0 |
| reserved4 | 0 |
| reserved5 | 0 |
| reserved6 | 0 |
| lfanew | 0x100 |
DOS stub
00000000: ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 |........!..L.!..| 00000010: 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 |This program mus| 00000020: 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 |t be run under W| 00000030: 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 |in32..$7........| 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000000c0:
PE Header
Packer / Compiler
Aspack v2.12b (Alexey Solodovnikov) This file is packed with ASPack. Analysis will be incomplete without unpacking. |
Sections
Data Directory
TLS
| raw start | raw end | index | callbks | zero fill | flags | |
|---|---|---|---|---|---|---|
| 0x433000 | 0x433008 | 0x4304b0 | 0x434010 | 0 | 0 |
| module_name | hint | ord | function_name |
|---|---|---|---|
| kernel32.dll | GetProcAddress | ||
| kernel32.dll | GetModuleHandleA | ||
| kernel32.dll | LoadLibraryA | ||
| user32.dll | GetKeyboardType | ||
| advapi32.dll | RegQueryValueExA | ||
| oleaut32.dll | VariantChangeTypeEx | ||
| advapi32.dll | RegQueryValueExA | ||
| gdi32.dll | UnrealizeObject | ||
| user32.dll | WindowFromPoint | ||
| comctl32.dll | ImageList_GetDragImage | ||
| comdlg32.dll | GetOpenFileNameA | ||
| libmng.dll | mng_status_dynamic |
![]() |
| Please donate some bucks to keep this site up and running: | |
| Ko-fi | |
|---|---|
| Yandex.Money | |
| Thank you! | |
[?] ignoring invalid PEdump::BITMAPINFOHEADER
[?] can't find file_offset of VA 0x3ae74
[?] can't find file_offset of VA 0x3b044
[?] can't find file_offset of VA 0x3b214
[?] ignoring invalid PEdump::BITMAPINFOHEADER
[?] can't find file_offset of VA 0x3b6cc
[?] can't find file_offset of VA 0x3b7c8
[?] can't find file_offset of VA 0x3b888
[?] can't find file_offset of VA 0x3b98c
[?] can't find file_offset of VA 0x3baf4
[?] can't find file_offset of VA 0x3bf48
[?] can't find file_offset of VA 0x3c2cc
[?] can't find file_offset of VA 0x3c65c
[?] can't find file_offset of VA 0x3c748
[?] can't find file_offset of VA 0x3c818
[?] can't find file_offset of VA 0x3cabc
[?] can't find file_offset of VA 0x3ce38
[?] can't find file_offset of VA 0x3d0d8
[?] can't find file_offset of VA 0x3d0e8
[?] can't find file_offset of VA 0x3d1f0
[?] can't find file_offset of VA 0x3e018
[?] can't find file_offset of VA 0x3e02c
[?] can't find file_offset of VA 0x3e040
[?] can't find file_offset of VA 0x3e054
[?] can't find file_offset of VA 0x3e068
[?] can't find file_offset of VA 0x3e07c
[?] can't find file_offset of VA 0x3e090
[?] can't find file_offset of VA 0x304b0
[?] can't find file_offset of VA 0x0
offset:( 0x )