readexe version 0.1 (Announce)
Announcement: 0.1.2 is now out with support for the "W3" EXE format, that is, the VxD table in WIN386.EXE.
segin@Draetheus-V[17:48]:{~\readexe}% .\readexe-win64.exe ..\OneDrive\C\WINDOWS\SYSTEM\WIN386.EXE
..\OneDrive\C\WINDOWS\SYSTEM\WIN386.EXE:
DOS executable with magic: MZ (0x5a4d)
Number of executable pages: 0x0036 (27136+ bytes)
Size of final page: 0x00000000 (0 bytes)
Total code size: 0x00006a00 (27136 bytes)
Total relocation entries: 0x000f
Header size in paragraphs: 0x0020 (512 bytes)
Minimum heap in paragraphs: 0x1400 (81920 bytes)
Maximum heap in paragraphs: 0xffff (1048560 bytes)
Minimum memory to load: 109056 bytes
Initial CS:IP (entrypoint): 0000:10ef
Initial SS:SP (stack): 06a0:0400
Checksum: 0x2f24
Relocation table offset: 0x0040
Overlay: 0x0000
MZ EXE relocaton table
Number of relocations: 15
[0] 0000:08cb
[1] 0000:0f97
[2] 0000:0fb3
[3] 0000:10f9
[4] 0000:19ff
[5] 0000:1acd
[6] 0000:2262
[7] 0000:24c8
[8] 0000:260d
[9] 0000:279f
[10] 0000:2827
[11] 0000:2f93
[12] 0348:1def
[13] 0348:1df3
[14] 0348:1df7
Offset to next header: 0x00006c00
W3 Executable header found at offset 0x00006c00
VxD Module Table:
ID Name Offset Size (dec)
------------------------------------------------------
[00] "WIN386 " 0x00007000 0x00003b8b (15243 bytes)
[01] "INT13 " 0x00022400 0x0000021b (539 bytes)
[02] "WDCTRL " 0x00023c00 0x000002aa (682 bytes)
[03] "VMD " 0x00027400 0x00000308 (776 bytes)
[04] "VPD " 0x00029c00 0x0000029a (666 bytes)
[05] "VWC " 0x0002c400 0x00000220 (544 bytes)
[06] "DOSNET " 0x0002ec00 0x0000023f (575 bytes)
[07] "VNETBIOS" 0x00031400 0x00000410 (1040 bytes)
[08] "EBIOS " 0x00035400 0x000001be (446 bytes)
[09] "VDDVGA " 0x00037c00 0x00000dbf (3519 bytes)
[0a] "VKD " 0x00042800 0x0000090c (2316 bytes)
[0b] "VPICD " 0x00047400 0x00000833 (2099 bytes)
[0c] "VTD " 0x0004a400 0x0000052d (1325 bytes)
[0d] "REBOOT " 0x0004c800 0x00000257 (599 bytes)
[0e] "VDMAD " 0x0004e400 0x00000790 (1936 bytes)
[0f] "VSD " 0x00051800 0x0000019b (411 bytes)
[10] "V86MMGR " 0x00053400 0x00000f99 (3993 bytes)
[11] "PAGESWAP" 0x0005fc00 0x0000038f (911 bytes)
[12] "DOSMGR " 0x00062400 0x000017e8 (6120 bytes)
[13] "VMPOLL " 0x0006e400 0x00000224 (548 bytes)
[14] "WSHELL " 0x0006fc00 0x00000daa (3498 bytes)
[15] "BLOCKDEV" 0x00076800 0x0000028e (654 bytes)
[16] "PAGEFILE" 0x00079400 0x0000048b (1163 bytes)
[17] "VFD " 0x0007c400 0x0000018a (394 bytes)
[18] "PARITY " 0x0007dc00 0x00000168 (360 bytes)
[19] "BIOSXLAT" 0x0007f400 0x000001b4 (436 bytes)
[1a] "VCD " 0x00080c00 0x00000507 (1287 bytes)
[1b] "VMCPD " 0x00084400 0x0000021e (542 bytes)
[1c] "COMBUFF " 0x00086c00 0x00000211 (529 bytes)
[1d] "CDPSCSI " 0x00088400 0x00000155 (341 bytes)
[1e] "QEMMFIX " 0x0008ac00 0x000001ac (428 bytes)
Complete thread:
- readexe version 0.1 - segin, 08.08.2023, 18:08 (Announce)
- readexe version 0.1 - DosWorld, 09.08.2023, 23:30
- readexe version 0.1 - segin, 11.08.2023, 12:49
- readexe version 0.1 - tkchia, 10.08.2023, 21:08
- readexe version 0.1 - segin, 11.08.2023, 12:46
- readexe version 0.1 - tkchia, 11.08.2023, 12:59
- readexe version 0.1 - segin, 11.08.2023, 13:50
- readexe version 0.1 - tkchia, 11.08.2023, 12:59
- readexe version 0.1 - segin, 11.08.2023, 12:46
- readexe version 0.1 - RayeR, 15.08.2023, 19:01
- readexe version 0.1 - segin, 15.08.2023, 19:53
- readexe version 0.1 - segin, 22.08.2023, 00:49
- readexe version 0.1 - Oso2k, 22.08.2023, 08:11
- readexe version 0.1 - Rugxulo, 22.08.2023, 15:51
- readexe version 0.1 - segin, 15.08.2023, 19:53
- readexe version 0.1 - DosWorld, 09.08.2023, 23:30