[spam][crazy] bomb malware

Karl gmkarl at gmail.com
Tue Dec 14 03:40:03 PST 2021


// this next line is 080480d1 .  this line is jumped to (referenced
XREF (j)) from 080480e4
                             LAB_080480d1
      XREF[1]:     080480e4(j)
// add 4 to the first active value (EAX is the first 32-bit register,
the working memory of a cpu)
        080480d1 83 c0 04        ADD        EAX,0x4

// set PTR_DAT_0804e024 to EAX
        080480d4 a3 24 e0        MOV        [PTR_DAT_0804e024],EAX
                      = 0804e00c
// these are further bytecode bytes.  the assembly statement is 5
bytes long (a3 24 e0 04 08)
                 04 08


More information about the cypherpunks mailing list