Just thoughts

Friday, November 26, 2010

So, after I hacked Google's Instant previews and now unfortunately for me, I can use it in a ... wherever I want, I had to do something neat. And here came in the picture Assembly :), so the rest of the post will be in assembly.

call 0x00890105
add [ecx+0x64E53160], cl
rcl [edx-0x75], cl
mov esi, [eax]
or al, 0x52
push edx
mov ecx, [ebx-0x488DD7EC]
mov tr1, [edx-0x1]
xor eax, eax
xor [esp+ebp*4], edi
jl 0x00000089
pop edx
loopnz 0x0000008B
call [edi+0x58]
mov ebx, [edx-0x15]
adc bl, [ebp-0x7A]
xor ebp, [eax+]
xor ch, [eax+]
jnc 0x00000113
lea edx, [eax]
and al, 0x00
push esp
inc esp
push esi
push eax
push esi
push esi
push esi
inc esi
push esi
dec esi
push ebx
push esi
push 0x8679CC56
aas 
aad 0xFF
loopnz 0x000000B7
push eax
push eax
push eax
push eax
inc eax
push eax
inc eax
jmp $0xDF68:0xDF68
push esi
dec esi
inc [esi+0x68]
xor [edi-0x2AE29FF8], al
push eax
mov ebx, 0x5668B5A2
xchg eax, ebp
cmps es:[edi], ds:[esi]
popf 
mov ebp, 0x3C06FFD5
or bh, [ebx+edi*8-0x80]
jnz 0x0000012E
push esi
dec esi
inc [esi+0x68]
xor [edi-0x2AE29FF8], al
push eax
mov ebx, 0x5668B5A2
xchg eax, ebp
cmps es:[edi], ds:[esi]
popf 
mov ebp, 0x3C06FFD5
or bh, [ebx+edi*8-0x80]
jnz 0x0000012E
mov ebx, 0x6F471305
jc 0x00000155
push 0xFF
push ebx
inc ecx
push 0xFF
push ebx
inc ecx
mov ebx, 0x6F471305
jc 0x00000155
push 0xFF
push ebx
inc ecx
pop edi
xor ch, [eax+0x54]
ja 0x000000EE
push edi
aad 0xC7
mov [ebp+0x68], esi
dec ebp
outs dl, ds:[esi]
jmp [ecx+0x68]
pop es
aad 0xFF
nop 
mov eax, 0x00290100
push esp
les ebp, [eax+0x50]
sub [ecx], 0x00
imul edx, ebp, 0xFF
push eax
push eax
push eax
push eax
push eax
inc eax
push eax
inc eax
jmp $0xDF68:0xDF68
pop edi
pop eax
mov ebx, [edx-0x15]
adc bl, [ebp-0x7A]
xor ebp, [eax+]
xor ch, [eax+]
jnc 0x00000113
pop edi
xor ch, [eax+0x54]
ja 0x000000EE
pop es
aad 0xFF
nop 
mov eax, 0x00290100
push esp
les ebp, [eax+0x50]
sub [ecx], 0x00
imul edx, ebp, 0xFF
push eax
push eax
push eax
push eax
push eax
inc eax
push eax
inc eax
jmp $0xDF68:0xDF68
sub al, 0x02
shl [eax], 0x0D
iret 
mov [ecx], 0x5257E2F0
push edx
mov ecx, [ebx-0x2FBDC3F0]
add [eax-0x75], eax
test [eax+0x74], edi
rol [ecx], 0x4A
push eax
ror [eax-0x75], 0x01
mov ebx, [eax]
and [eax-0x2D], bl
add [ebx], edi
mov ecx, [ecx-0x75]
xor al, 0xD6
add edi, edi
xor eax, eax
xor ecx, eax
lods al, ds:[esi]
or eax, 0xE001C7CF
cmp ah, dh
jnz 0x000000E2
call [ebx-0x2B]
push edi
push ebx
jz 0x00000152
outs edx, ds:[esi]
jc 0x00000155
push 0xFF
push ebx
inc ecx
cmp ebp, esp
jmp ecx
add edi, [ebx]
clc 
and al, 0x7D
loop 0x000000E1
jmp 0xD55400E5
mov ebx, [eax+0x24]
pop eax
rol [ecx], cl
mov esp, [esi+0x4B]
or al, 0x58
mov eax, [ecx]
sbb al, 0x8B
ror [ebx+0x4401D004], cl
mov [esp], esp
pop ebx
pop ebx
pop ecx
popa 
push ecx
pop edx
loopnz 0x0000008B
pop edi
pop eax
mov ebx, [edx-0x15]
adc bl, [ebp-0x7A]
xor ebp, [eax+]
xor ch, [eax+]
jnc 0x00000113
pop edi
xor ch, [eax+0x54]
ja 0x000000EE
pop es
aad 0xFF
nop 
mov eax, 0x00290100
push esp
les ebp, [eax+0x50]
sub [ecx], 0x00
imul edx, ebp, 0xFF
push eax
push eax
push eax
push eax
push eax
inc eax
push eax
inc eax
jmp $0xDF68:0xDF68 

Tomorrow I tell you what it does. Or not, will see :)

1 Comments:

Blogger ithinkyoureamazing said...

What does it mean? Please tell us what it does!

February 3, 2011 at 12:03 PM  

Post a Comment

Subscribe to Post Comments [Atom]

<< Home