Tag: reverse-engineering

Converting a malware dropper to x64 assembly

Practical lessons from converting a C malware dropper to x64 Windows assembly, covering shadow spaces, calling conventions, and memory segments.