use some tool like Win32dasm or IDA to get to the deadlisting(you should be able to see lots of scripts,
maybe even useful comments that IDA makes) and if it's not encrypted maybe you
can find some .DATA section in it that has the source or maybe you can proceed to actually figguring out what it does.