filename | mngview.exe | |
---|---|---|
size | 103424 (0x19400) | |
md5 | 2788776d93e15b2007d8565a22ddd17e | |
type | PE32 executable (GUI) Intel 80386, for MS Windows | |
mimetype | application/x-dosexec | |
clamav | scan pending | |
virustotal | → scan with virustotal.com | |
histogram |
MZ Header
signature | MZ |
bytes_in_last_block | 0x50 |
blocks_in_file | 2 |
num_relocs | 0 |
header_paragraphs | 4 |
min_extra_paragraphs | 0xf |
max_extra_paragraphs | 0xffff |
ss | 0 |
sp | 0xb8 |
checksum | 0 |
ip | 0 |
cs | 0 |
reloc_table_offset | 0x40 |
overlay_number | 0x1a |
reserved0 | 0 |
oem_id | 0 |
oem_info | 0 |
reserved2 | 0 |
reserved3 | 0 |
reserved4 | 0 |
reserved5 | 0 |
reserved6 | 0 |
lfanew | 0x100 |
DOS stub
00000000: ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 |........!..L.!..| 00000010: 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 |This program mus| 00000020: 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 |t be run under W| 00000030: 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 |in32..$7........| 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000000c0:
PE Header
Packer / Compiler
Aspack v2.12b (Alexey Solodovnikov) This file is packed with ASPack. Analysis will be incomplete without unpacking. |
Sections
Data Directory
TLS
raw start | raw end | index | callbks | zero fill | flags | |
---|---|---|---|---|---|---|
0x433000 | 0x433008 | 0x4304b0 | 0x434010 | 0 | 0 |
module_name | hint | ord | function_name |
---|---|---|---|
kernel32.dll | GetProcAddress | ||
kernel32.dll | GetModuleHandleA | ||
kernel32.dll | LoadLibraryA | ||
user32.dll | GetKeyboardType | ||
advapi32.dll | RegQueryValueExA | ||
oleaut32.dll | VariantChangeTypeEx | ||
advapi32.dll | RegQueryValueExA | ||
gdi32.dll | UnrealizeObject | ||
user32.dll | WindowFromPoint | ||
comctl32.dll | ImageList_GetDragImage | ||
comdlg32.dll | GetOpenFileNameA | ||
libmng.dll | mng_status_dynamic |
Please donate some bucks to keep this site up and running: | |
Ko-fi | |
---|---|
Yandex.Money | |
Thank you! |
[?] ignoring invalid PEdump::BITMAPINFOHEADER
[?] can't find file_offset of VA 0x3ae74
[?] can't find file_offset of VA 0x3b044
[?] can't find file_offset of VA 0x3b214
[?] ignoring invalid PEdump::BITMAPINFOHEADER
[?] can't find file_offset of VA 0x3b6cc
[?] can't find file_offset of VA 0x3b7c8
[?] can't find file_offset of VA 0x3b888
[?] can't find file_offset of VA 0x3b98c
[?] can't find file_offset of VA 0x3baf4
[?] can't find file_offset of VA 0x3bf48
[?] can't find file_offset of VA 0x3c2cc
[?] can't find file_offset of VA 0x3c65c
[?] can't find file_offset of VA 0x3c748
[?] can't find file_offset of VA 0x3c818
[?] can't find file_offset of VA 0x3cabc
[?] can't find file_offset of VA 0x3ce38
[?] can't find file_offset of VA 0x3d0d8
[?] can't find file_offset of VA 0x3d0e8
[?] can't find file_offset of VA 0x3d1f0
[?] can't find file_offset of VA 0x3e018
[?] can't find file_offset of VA 0x3e02c
[?] can't find file_offset of VA 0x3e040
[?] can't find file_offset of VA 0x3e054
[?] can't find file_offset of VA 0x3e068
[?] can't find file_offset of VA 0x3e07c
[?] can't find file_offset of VA 0x3e090
[?] can't find file_offset of VA 0x304b0
[?] can't find file_offset of VA 0x0