• tedu
    link
    fedilink
    -118 months ago

    Yeah, so if they have the code, they could run it…

    • Destide
      link
      fedilink
      English
      32
      edit-2
      8 months ago

      That’s not how code of this magnitude works off the cuff GetPhysicallyInstalledSystemMemory() and GetPhysicalDiskSize()) aren’t defined and might exist in a file they couldn’t access. It’s also in C++ so you’d have to compile it first no one’s going through all that for a visual screenshot of a watermark at this stage

      • @Valmond
        link
        28 months ago

        Wow that’s some crappy C/C++ code, there’s even a goto 😁

        But whats the 0i64?

    • @[email protected]
      link
      fedilink
      68 months ago

      They kinda don’t have the sources there. That’s a decompilation by IDA in that image.

      But nevertheless they could run it if they set up an arm64 machine, technically.

    • ඞmir
      link
      fedilink
      18 months ago

      If you want a serious answer, you could theoretically disable all security checks on Win11 so you could hex-edit patch it to run, but it would be (1) a lot of effort and (2) probably show that it’s nowhere near finished, because it still misses UI integration for example