Ability to point to offset where Reflector fails to read in DLL file

In my hobby, I do some malware and apps research and see what's inside. I came across a malware that have protected dll file that it can't be decompiled and i have to use hex editor to fix the problem.
In Reflector, it always tell me any errors if it failes to read, and I always use Reflector to get answer by error messages. dnSpy doesn't tell me any errors.

It would be awesome if Reflector could point to offset where Reflector fails to read in DLL file. Example: I modify the bytes at offset 0x4 and open it in Reflector, it should return error with offset "File is not a portable executable. DOS header does not contain 'MZ' signature. 0x4". This will be so useful.
Sign In or Register to comment.