mov eax, 00401000
SearchAOB:
cmp [eax], 8B09B60F
je StartHook
inc eax
cmp eax, 00BFE000
jle SearchAOB
push 10 //MB_ICONERROR
push Title
push FailureMsg
push 00
call MessageBoxA
ret
StartHook:
lea ebx, [eax+05] //The Target Address - The Next Address
sub ebx, MSCRCBypass
neg ebx
mov byte ptr [eax], e9 //jmp
mov [eax+01], ebx //Target AOB
mov byte ptr [eax+05], 90 //nop
add eax, 6
mov [BackToMSCRC], eax //Return to the address+6
push 40 //MB_ICONINFORMATION
push Title
push SuccessMsg
push 00
call MessageBoxA
ret
Title:
db 'NimoMSHS CRC Bypass Script by nimo1993' 00
FailureMsg:
db 'Nimo Anti-MS-HS-CRC-Check Fail!' 00
SuccessMsg:
db 'Nimo Anti-MS-HS-CRC-Check Init Successfully!' 00
BackToMSCRC:
dd 0
OpenProcess:
jmp HSCRCBypass
[Disable]
OpenProcess:
mov edi, edi
push ebp
mov ebp, esp
作者: 藤宮香織 時間: 2018-1-6 16:53
[Enable]
//MS+HS CRC Bypass v1.1 for "TWMS 1.13" & "HackShield 5.3.5.1024"
//CE Assembly Script by nimo1993. I love CE!
//The original address of MS-CRC Bypass is not found by me.
//If you can't execute this script, please press "Memory view"->"View". Check whether "Kernelmode symbols" item is checked.
//如果你無法執行這個數據,請按Memory View->View->Kernelmode symbols 打勾