int3E8
Int3E8 is not a standard term in official documentation, but it is sometimes used in security research and reverse engineering to describe a small x86 machine-code sequence consisting of the INT 3 instruction followed by a near CALL instruction. The two relevant opcodes are 0xCC for INT 3 and 0xE8 for a relative near call. When encountered in a binary or shellcode, this pattern is read as two consecutive instructions: a breakpoint trap and then a call to a target address computed from the subsequent displacement.
Int 3 (0xCC) is a debugging aid that triggers a breakpoint exception, typically causing a debugger to
In use, the exact effect depends on the execution environment and whether a debugger is attached. In
See also: INT 3 instruction; CALL (x86) instruction; shellcode; obfuscation techniques.