So, after I hacked Google's Instant previews and now unfortunately for me, I can use it in a ... wherever I want, I had to do something neat. And here came in the picture Assembly :), so the rest of the post will be in assembly.
call 0x00890105 add [ecx+0x64E53160], cl rcl [edx-0x75], cl mov esi, [eax] or al, 0x52 push edx mov ecx, [ebx-0x488DD7EC] mov tr1, [edx-0x1] xor eax, eax xor [esp+ebp*4], edi jl 0x00000089 pop edx loopnz 0x0000008B call [edi+0x58] mov ebx, [edx-0x15] adc bl, [ebp-0x7A] xor ebp, [eax+] xor ch, [eax+] jnc 0x00000113 lea edx, [eax] and al, 0x00 push esp inc esp push esi push eax push esi push esi push esi inc esi push esi dec esi push ebx push esi push 0x8679CC56 aas aad 0xFF loopnz 0x000000B7 push eax push eax push eax push eax inc eax push eax inc eax jmp $0xDF68:0xDF68 push esi dec esi inc [esi+0x68] xor [edi-0x2AE29FF8], al push eax mov ebx, 0x5668B5A2 xchg eax, ebp cmps es:[edi], ds:[esi] popf mov ebp, 0x3C06FFD5 or bh, [ebx+edi*8-0x80] jnz 0x0000012E push esi dec esi inc [esi+0x68] xor [edi-0x2AE29FF8], al push eax mov ebx, 0x5668B5A2 xchg eax, ebp cmps es:[edi], ds:[esi] popf mov ebp, 0x3C06FFD5 or bh, [ebx+edi*8-0x80] jnz 0x0000012E mov ebx, 0x6F471305 jc 0x00000155 push 0xFF push ebx inc ecx push 0xFF push ebx inc ecx mov ebx, 0x6F471305 jc 0x00000155 push 0xFF push ebx inc ecx pop edi xor ch, [eax+0x54] ja 0x000000EE push edi aad 0xC7 mov [ebp+0x68], esi dec ebp outs dl, ds:[esi] jmp [ecx+0x68] pop es aad 0xFF nop mov eax, 0x00290100 push esp les ebp, [eax+0x50] sub [ecx], 0x00 imul edx, ebp, 0xFF push eax push eax push eax push eax push eax inc eax push eax inc eax jmp $0xDF68:0xDF68 pop edi pop eax mov ebx, [edx-0x15] adc bl, [ebp-0x7A] xor ebp, [eax+] xor ch, [eax+] jnc 0x00000113 pop edi xor ch, [eax+0x54] ja 0x000000EE pop es aad 0xFF nop mov eax, 0x00290100 push esp les ebp, [eax+0x50] sub [ecx], 0x00 imul edx, ebp, 0xFF push eax push eax push eax push eax push eax inc eax push eax inc eax jmp $0xDF68:0xDF68 sub al, 0x02 shl [eax], 0x0D iret mov [ecx], 0x5257E2F0 push edx mov ecx, [ebx-0x2FBDC3F0] add [eax-0x75], eax test [eax+0x74], edi rol [ecx], 0x4A push eax ror [eax-0x75], 0x01 mov ebx, [eax] and [eax-0x2D], bl add [ebx], edi mov ecx, [ecx-0x75] xor al, 0xD6 add edi, edi xor eax, eax xor ecx, eax lods al, ds:[esi] or eax, 0xE001C7CF cmp ah, dh jnz 0x000000E2 call [ebx-0x2B] push edi push ebx jz 0x00000152 outs edx, ds:[esi] jc 0x00000155 push 0xFF push ebx inc ecx cmp ebp, esp jmp ecx add edi, [ebx] clc and al, 0x7D loop 0x000000E1 jmp 0xD55400E5 mov ebx, [eax+0x24] pop eax rol [ecx], cl mov esp, [esi+0x4B] or al, 0x58 mov eax, [ecx] sbb al, 0x8B ror [ebx+0x4401D004], cl mov [esp], esp pop ebx pop ebx pop ecx popa push ecx pop edx loopnz 0x0000008B pop edi pop eax mov ebx, [edx-0x15] adc bl, [ebp-0x7A] xor ebp, [eax+] xor ch, [eax+] jnc 0x00000113 pop edi xor ch, [eax+0x54] ja 0x000000EE pop es aad 0xFF nop mov eax, 0x00290100 push esp les ebp, [eax+0x50] sub [ecx], 0x00 imul edx, ebp, 0xFF push eax push eax push eax push eax push eax inc eax push eax inc eax jmp $0xDF68:0xDF68
Tomorrow I tell you what it does. Or not, will see :)
1 Comments:
What does it mean? Please tell us what it does!
Post a Comment
Subscribe to Post Comments [Atom]
<< Home