Codigo Hackshield
4 participantes
:: Ant-Hackers :: HackShield
Página 1 de 1
Codigo Hackshield
Codigo da HackShield pra quem quise fazer Bypass
Loads HS
Creditos:DeadLineHF Por Achar o codigo.
- Código:
004612D0 /$ 53 PUSH EBX
004612D1 |. 57 PUSH EDI
004612D2 |. 8D7E 04 LEA EDI,DWORD PTR DS:[ESI+4]
004612D5 |. 57 PUSH EDI
004612D6 |. E8 75932C00 CALL engine_d.0072A650
004612DB |. 8AD8 MOV BL,AL
004612DD |. 84DB TEST BL,BL
004612DF |. 74 29 JE SHORT engine_d.0046130A
004612E1 |. 0FB646 27 MOVZX EAX,BYTE PTR DS:[ESI+27]
004612E5 |. 0FB64E 28 MOVZX ECX,BYTE PTR DS:[ESI+28]
004612E9 |. 8A56 29 MOV DL,BYTE PTR DS:[ESI+29]
004612EC |. 8846 1D MOV BYTE PTR DS:[ESI+1D],AL
004612EF |. 0FB646 2A MOVZX EAX,BYTE PTR DS:[ESI+2A]
004612F3 |. 884E 1E MOV BYTE PTR DS:[ESI+1E],CL
004612F6 |. 0FB64E 2B MOVZX ECX,BYTE PTR DS:[ESI+2B]
004612FA |. 8846 20 MOV BYTE PTR DS:[ESI+20],AL
004612FD |. 8856 1F MOV BYTE PTR DS:[ESI+1F],DL
00461300 |. 884E 21 MOV BYTE PTR DS:[ESI+21],CL
00461303 |. B8 78C37A00 MOV EAX,engine_d.007AC378 ; ASCII "true"
00461308 |. EB 05 JMP SHORT engine_d.0046130F
0046130A |> B8 80C37A00 MOV EAX,engine_d.007AC380 ; ASCII "false"
0046130F |> 8B15 98509200 MOV EDX,DWORD PTR DS:[925098]
00461315 |. 50 PUSH EAX
00461316 |. 57 PUSH EDI
00461317 |. 68 88C37A00 PUSH engine_d.007AC388 ; ASCII "HWID [%s] Result[%s]"
0046131C |. 52 PUSH EDX
0046131D |. E8 3EFDFFFF CALL engine_d.00461060
00461322 |. 83C4 10 ADD ESP,10
00461325 |. 68 0C538000 PUSH engine_d.0080530C
0046132A |. 6A 2C PUSH 2C
0046132C |. 56 PUSH ESI
0046132D |. C706 993A2FFF MOV DWORD PTR DS:[ESI],FF2F3A99
00461333 |. E8 12932C00 CALL engine_d.0072A64A
00461338 |. 5F POP EDI
00461339 |. 8AC3 MOV AL,BL
0046133B |. 5B POP EBX
0046133C \. C3 RETN
Loads HS
- Código:
00469010 /$ 81EC 40050000 SUB ESP,540
00469016 |. A1 B4028000 MOV EAX,DWORD PTR DS:[8002B4]
0046901B |. 33C4 XOR EAX,ESP
0046901D |. 898424 3C05000>MOV DWORD PTR SS:[ESP+53C],EAX
00469024 |. 8D4424 20 LEA EAX,DWORD PTR SS:[ESP+20]
00469028 |. 8D4C24 2C LEA ECX,DWORD PTR SS:[ESP+2C]
0046902C |. 6A 00 PUSH 0
0046902E |. C74424 24 9800>MOV DWORD PTR SS:[ESP+24],98
00469036 |. C74424 28 9900>MOV DWORD PTR SS:[ESP+28],99
0046903E |. C74424 2C 9400>MOV DWORD PTR SS:[ESP+2C],94
00469046 |. C74424 30 9500>MOV DWORD PTR SS:[ESP+30],95
0046904E |. C74424 34 9600>MOV DWORD PTR SS:[ESP+34],96
00469056 |. C74424 38 9700>MOV DWORD PTR SS:[ESP+38],97
0046905E |. 894424 14 MOV DWORD PTR SS:[ESP+14],EAX
00469062 |. 894C24 18 MOV DWORD PTR SS:[ESP+18],ECX
00469066 |. C74424 0C 80B0>MOV DWORD PTR SS:[ESP+C],engine_d.0077B080 ; ASCII "HShield\splash.jpg"
0046906E |. C74424 10 68B0>MOV DWORD PTR SS:[ESP+10],engine_d.0077B068 ; ASCII "HShield\hsupdate.jpg"
00469076 |. E8 12882800 CALL engine_d.006F188D
0046907B |. 50 PUSH EAX ; |Arg1
0046907C |. E8 5F942800 CALL engine_d.006F24E0 ; \engine_d.006F24E0
00469081 |. 83C4 08 ADD ESP,8
00469084 |. E8 69942800 CALL engine_d.006F24F2
00469089 |. 33D2 XOR EDX,EDX
0046908B |. B9 03000000 MOV ECX,3
00469090 |. F7F1 DIV ECX
00469092 |. 895424 18 MOV DWORD PTR SS:[ESP+18],EDX
00469096 |. E8 57942800 CALL engine_d.006F24F2
0046909B |. 33D2 XOR EDX,EDX
0046909D |. B9 03000000 MOV ECX,3
004690A2 |. F7F1 DIV ECX
004690A4 |. 68 04010000 PUSH 104 ; /BufSize = 104 (260.)
004690A9 |. 895424 20 MOV DWORD PTR SS:[ESP+20],EDX ; |
004690AD |. 8D9424 4001000>LEA EDX,DWORD PTR SS:[ESP+140] ; |
004690B4 |. 52 PUSH EDX ; |PathBuffer
004690B5 |. 6A 00 PUSH 0 ; |hModule = NULL
004690B7 |. FF15 F8817700 CALL DWORD PTR DS:[<&kernel32.GetModuleFileNameA>] ; \GetModuleFileNameA
004690BD |. 8D8424 3C01000>LEA EAX,DWORD PTR SS:[ESP+13C]
004690C4 |. 6A 5C PUSH 5C
004690C6 |. 50 PUSH EAX
004690C7 |. E8 94872800 CALL engine_d.006F1860
004690CC |. 83C4 08 ADD ESP,8
004690CF |. 85C0 TEST EAX,EAX
004690D1 |. 0F84 F9000000 JE engine_d.004691D0
004690D7 |. 53 PUSH EBX
004690D8 |. 55 PUSH EBP
004690D9 |. 56 PUSH ESI
004690DA |. 57 PUSH EDI
004690DB |. 6A 00 PUSH 0 ; /pModule = NULL
004690DD |. C600 00 MOV BYTE PTR DS:[EAX],0 ; |
004690E0 |. FF15 FC817700 CALL DWORD PTR DS:[<&kernel32.GetModuleHandleA>] ; \GetModuleHandleA
004690E6 |. 8BD8 MOV EBX,EAX
004690E8 |. 33FF XOR EDI,EDI
004690EA |. 8D9B 00000000 LEA EBX,DWORD PTR DS:[EBX]
004690F0 |> 8B4C3C 28 /MOV ECX,DWORD PTR SS:[ESP+EDI+28]
004690F4 |. 8B543C 20 |MOV EDX,DWORD PTR SS:[ESP+EDI+20]
004690F8 |. 0FB7048A |MOVZX EAX,WORD PTR DS:[EDX+ECX*4]
004690FC |. 68 5CB07700 |PUSH engine_d.0077B05C ; /ResourceType = "HSHIELD_IMG"
00469101 |. 50 |PUSH EAX ; |ResourceName
00469102 |. 53 |PUSH EBX ; |hModule
00469103 |. FF15 34827700 |CALL DWORD PTR DS:[<&kernel32.FindResourceA>] ; \FindResourceA
00469109 |. 8BF0 |MOV ESI,EAX
0046910B |. 85F6 |TEST ESI,ESI
0046910D |. 0F84 AD000000 |JE engine_d.004691C0
00469113 |. 56 |PUSH ESI ; /hResource
00469114 |. 53 |PUSH EBX ; |hModule
00469115 |. FF15 30827700 |CALL DWORD PTR DS:[<&kernel32.LoadResource>] ; \LoadResource
0046911B |. 85C0 |TEST EAX,EAX
0046911D |. 0F84 9D000000 |JE engine_d.004691C0
00469123 |. 50 |PUSH EAX ; /hResource
00469124 |. FF15 2C827700 |CALL DWORD PTR DS:[<&kernel32.LockResource>] ; \LockResource
0046912A |. 894424 14 |MOV DWORD PTR SS:[ESP+14],EAX
0046912E |. 85C0 |TEST EAX,EAX
00469130 |. 0F84 8A000000 |JE engine_d.004691C0
00469136 |. 56 |PUSH ESI ; /hResource
00469137 |. 53 |PUSH EBX ; |hModule
00469138 |. FF15 28827700 |CALL DWORD PTR DS:[<&kernel32.SizeofResource>] ; \SizeofResource
0046913E |. 8B4C3C 18 |MOV ECX,DWORD PTR SS:[ESP+EDI+18]
00469142 |. 51 |PUSH ECX
00469143 |. 8D9424 5001000>|LEA EDX,DWORD PTR SS:[ESP+150]
0046914A |. 52 |PUSH EDX
0046914B |. 8BE8 |MOV EBP,EAX
0046914D |. 8D4424 50 |LEA EAX,DWORD PTR SS:[ESP+50]
00469151 |. 68 54B07700 |PUSH engine_d.0077B054 ; ASCII "%s\%s"
00469156 |. 50 |PUSH EAX
00469157 |. E8 52882800 |CALL engine_d.006F19AE
0046915C |. 83C4 10 |ADD ESP,10
0046915F |. 68 80000000 |PUSH 80 ; /FileAttributes = NORMAL
00469164 |. 8D4C24 4C |LEA ECX,DWORD PTR SS:[ESP+4C] ; |
00469168 |. 51 |PUSH ECX ; |FileName
00469169 |. FF15 24827700 |CALL DWORD PTR DS:[<&kernel32.SetFileAttributesA>] ; \SetFileAttributesA
0046916F |. 8D5424 48 |LEA EDX,DWORD PTR SS:[ESP+48]
00469173 |. 52 |PUSH EDX ; /FileName
00469174 |. FF15 DC817700 |CALL DWORD PTR DS:[<&kernel32.DeleteFileA>] ; \DeleteFileA
0046917A |. 6A 00 |PUSH 0 ; /hTemplateFile = NULL
0046917C |. 68 80000000 |PUSH 80 ; |Attributes = NORMAL
00469181 |. 6A 02 |PUSH 2 ; |Mode = CREATE_ALWAYS
00469183 |. 6A 00 |PUSH 0 ; |pSecurity = NULL
00469185 |. 6A 03 |PUSH 3 ; |ShareMode = FILE_SHARE_READ|FILE_SHARE_WRITE
00469187 |. 68 00000040 |PUSH 40000000 ; |Access = GENERIC_WRITE
0046918C |. 8D4424 60 |LEA EAX,DWORD PTR SS:[ESP+60] ; |
00469190 |. 50 |PUSH EAX ; |FileName
00469191 |. FF15 20827700 |CALL DWORD PTR DS:[<&kernel32.CreateFileA>] ; \CreateFileA
00469197 |. 8BF0 |MOV ESI,EAX
00469199 |. 85F6 |TEST ESI,ESI
0046919B |. 74 23 |JE SHORT engine_d.004691C0
0046919D |. 8B5424 14 |MOV EDX,DWORD PTR SS:[ESP+14]
004691A1 |. 6A 00 |PUSH 0 ; /pOverlapped = NULL
004691A3 |. 8D4C24 14 |LEA ECX,DWORD PTR SS:[ESP+14] ; |
004691A7 |. 51 |PUSH ECX ; |pBytesWritten
004691A8 |. 55 |PUSH EBP ; |nBytesToWrite
004691A9 |. 52 |PUSH EDX ; |Buffer
004691AA |. 56 |PUSH ESI ; |hFile
004691AB |. C74424 24 0000>|MOV DWORD PTR SS:[ESP+24],0 ; |
004691B3 |. FF15 1C827700 |CALL DWORD PTR DS:[<&kernel32.WriteFile>] ; \WriteFile
004691B9 |. 56 |PUSH ESI ; /hObject
004691BA |. FF15 08827700 |CALL DWORD PTR DS:[<&kernel32.CloseHandle>] ; \CloseHandle
004691C0 |> 83C7 04 |ADD EDI,4
004691C3 |. 83FF 08 |CMP EDI,8
004691C6 |.^0F8C 24FFFFFF \JL engine_d.004690F0
004691CC |. 5F POP EDI
004691CD |. 5E POP ESI
004691CE |. 5D POP EBP
004691CF |. 5B POP EBX
004691D0 |> 8B8C24 3C05000>MOV ECX,DWORD PTR SS:[ESP+53C]
004691D7 |. 33CC XOR ECX,ESP
004691D9 |. E8 41782800 CALL engine_d.006F0A1F
004691DE |. 81C4 40050000 ADD ESP,540
004691E4 \. C3 RETN
Creditos:DeadLineHF Por Achar o codigo.
CoderBlack09- Programer
- Mensagens : 103
Créditos : 166
Obrigado : 11
Data de inscrição : 16/01/2012
Idade : 32
Localização : Striker
Re: Codigo Hackshield
como faz bypass?
GhostRider- Membro
- Mensagens : 24
Créditos : 24
Obrigado : 0
Data de inscrição : 11/06/2012
Idade : 27
Localização : Sao Paulo
Re: Codigo Hackshield
$-LAMMER-$ escreveu:mas para que serve esse código....
Fazer Bypass(Conhecido como Unloock)...
CoderBlack09- Programer
- Mensagens : 103
Créditos : 166
Obrigado : 11
Data de inscrição : 16/01/2012
Idade : 32
Localização : Striker
Re: Codigo Hackshield
Fazer Bypass(Conhecido como Unloock)...
Não Entendi muito bem mas valeu por postar...
Re: Codigo Hackshield
$-LAMMER-$ escreveu:Fazer Bypass(Conhecido como Unloock)...
Não Entendi muito bem mas valeu por postar...
Bypass é tipo um desbloqueador que faz com q hacks q n funciona mais funciona, fazendo a hackshield para de atualiza e aparece q esta atualizando...
se e q entendeu kkkkkkk
Hacker Striker- Administrador
- Mensagens : 439
Créditos : 3138
Obrigado : 115
Data de inscrição : 16/12/2011
Idade : 26
Localização : Rio de janeiro
:: Ant-Hackers :: HackShield
Página 1 de 1
Permissões neste sub-fórum
Não podes responder a tópicos