[spam][crazy] bomb malware
Karl
gmkarl at gmail.com
Tue Dec 14 03:40:03 PST 2021
// this next line is 080480d1 . this line is jumped to (referenced
XREF (j)) from 080480e4
LAB_080480d1
XREF[1]: 080480e4(j)
// add 4 to the first active value (EAX is the first 32-bit register,
the working memory of a cpu)
080480d1 83 c0 04 ADD EAX,0x4
// set PTR_DAT_0804e024 to EAX
080480d4 a3 24 e0 MOV [PTR_DAT_0804e024],EAX
= 0804e00c
// these are further bytecode bytes. the assembly statement is 5
bytes long (a3 24 e0 04 08)
04 08
More information about the cypherpunks
mailing list