2013年2月23日 星期六

[Release] - Some Ehsvc 5.6.7.237 Address

Ehsvc.dll+7C22D //callback 1
Ehsvc.dll+A048  //callback 2

Ehsvc.dll+9A8C2 //Nanoscan 1
Ehsvc.dll+9830F //NanoScan 2

Ehsvc.dll+7B7A0 //Self CRC
Ehsvc.dll+9FB0  //Detection

Ehsvc.dll+2C371 //Assembly
Ehsvc.dll+3CFFE //Anticrash

Ehsvc.dll+3CF90 //Nanocheck 1
Ehsvc.dll+3A3A1 //Nanocheck 2
Ehsvc.dll+3C448 //Nanocheck 3


But Modifying after running about 2~3 minutes will D/C
Maybe AhnLab has been Added some new detected


5 則留言:

  1. thanks for sharing this.
    After I made this for ehsvc 5.6.28.404.
    I found simple method of hscrc bypass.
    It isn't caused d/c, because it isn't writing memory to ehsvc.
    it is writing to fake return only 1 API.

    回覆刪除
    回覆
    1. Taiwan's Hackshield detect one more than foreign's
      So I didn't think that same method will effective

      Isn't writing memory to ehsvc ?
      Injection dll ?

      刪除
  2. 作者已經移除這則留言。

    回覆刪除
  3. Hi! Can you hack Taiwan's HackShield (5.6.28.404) for KartRider? Just updated recently...and not easy to crack...Running about 5 mins will D/C... I can send you all the HS processes (folders). Thanks!

    回覆刪除