Haha sorry for stealing your thunder, especially since you're the one who showed me the vids first! XD
EDIT: damn, ninjas all over the place!
Ashtoreth, Sashkakuhta and I should all jump into a jacuzzi together.
I'm guessing song.vid is a clip from Depth.
How do I get back from wau directory ? D:
(05-24-2015, 09:00 AM)Plazmater Wrote: [ -> ]How do I get back from wau directory ? D:
Type
cd.. (with two dots), this will back you out of whatever directory you're currently in.
(05-23-2015, 09:30 PM)Apjjm Wrote: [ -> ]The ones i got:
Edit: Any joy with pk0/qWxx.txt yet?
It most likely represents a number in hexadecimal, since the only letters in it are a,b,c,d,e, and f. Maybe it's an image broken down into numbers?
EDIT: Someone on 4Chan apparently translated it into x86 assembly.
http://pastebin.com/QA4WLDrS
I don't want to read it line by line and find out what it does, so can anyone assemble it, run it and find out if it does anything useful?
(05-24-2015, 09:17 AM)Crypter Wrote: [ -> ]EDIT: Someone on 4Chan apparently translated it into x86 assembly.
http://pastebin.com/QA4WLDrS
I don't want to read it line by line and find out what it does, so can anyone assemble it, run it and find out if it does anything useful?
Don't looks like a working assembly code, i sure that compiler are not going to like JMPs leading to the middle of another instruction parameters.
(05-24-2015, 10:27 AM)Sashkakuhta Wrote: [ -> ] (05-24-2015, 09:17 AM)Crypter Wrote: [ -> ]EDIT: Someone on 4Chan apparently translated it into x86 assembly.
http://pastebin.com/QA4WLDrS
I don't want to read it line by line and find out what it does, so can anyone assemble it, run it and find out if it does anything useful?
Don't looks like a working assembly code, i sure that compiler are not going to like JMPs leading to the middle of another instruction parameters.
Yes, it sure doesn't seem like something that was meant to work. That jump just leads to an unknown area, which is probably pre-occupied with stuff from the previous program that used the segment. Maybe try to convert the number into an image?
It's not assembly code or an image or anything similar. It also isn't to be interpreted as a single number because it wouldn't start with a null byte then. It appears completely random, so it's either a cryptographic key or encrypted or compressed data. I guess we'll have to wait for more clues, the ARG isn't over yet.