Results 1 to 4 of 4
  1. #1
    scriptkiddy's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    Canada
    Posts
    67
    Reputation
    12
    Thanks
    63

    [Release] MapleStory Bypass Assembly Pseudo 12/17/2011

    Same person - Data

    Code:
    0C121000 Ehsvc Base
    0C18EE28   55               PUSH EBP
    0C18EE29   8BEC             MOV EBP,ESP
    0C18EE2B   83EC 08          SUB ESP,8
    0C18EE2E   8B45 08          MOV EAX,DWORD PTR SS:[EBP+8]
    0C18EE31   8945 FC          MOV DWORD PTR SS:[EBP-4],EAX
    0C18EE34   8B4D 14          MOV ECX,DWORD PTR SS:[EBP+14]
    0C18EE37   8B11             MOV EDX,DWORD PTR DS:[ECX]
    0C18EE39   8955 F8          MOV DWORD PTR SS:[EBP-8],EDX
    0C18EE3C   8B45 0C          MOV EAX,DWORD PTR SS:[EBP+C]
    0C18EE3F   8B4D 0C          MOV ECX,DWORD PTR SS:[EBP+C]
    0C18EE42   83E9 01          SUB ECX,1
    0C18EE45   894D 0C          MOV DWORD PTR SS:[EBP+C],ECX
    0C18EE48   85C0             TEST EAX,EAX
    0C18EE4A   74 31            JE SHORT EHSvc.0C18EE7D
    0C18EE4C   8B55 F8          MOV EDX,DWORD PTR SS:[EBP-8]
    0C18EE4F   C1EA 08          SHR EDX,8
    0C18EE52   8955 F8          MOV DWORD PTR SS:[EBP-8],EDX
    0C18EE55   8B45 F8          MOV EAX,DWORD PTR SS:[EBP-8]
    0C18EE58   25 FF000000      AND EAX,0FF
    0C18EE5D   8B4D FC          MOV ECX,DWORD PTR SS:[EBP-4]
    0C18EE60   33D2             XOR EDX,EDX
    0C18EE62   8A11             MOV DL,BYTE PTR DS:[ECX]
    0C18EE64   33C2             XOR EAX,EDX
    0C18EE66   8B4D 10          MOV ECX,DWORD PTR SS:[EBP+10]
    0C18EE69   8B55 F8          MOV EDX,DWORD PTR SS:[EBP-8]
    0C18EE6C   331481           XOR EDX,DWORD PTR DS:[ECX+EAX*4]
    0C18EE6F   8955 F8          MOV DWORD PTR SS:[EBP-8],EDX
    0C18EE72   8B45 FC          MOV EAX,DWORD PTR SS:[EBP-4]
    0C18EE75   83C0 01          ADD EAX,1
    0C18EE78   8945 FC          MOV DWORD PTR SS:[EBP-4],EAX
    0C18EE7B  ^EB BF            JMP SHORT EHSvc.0C18EE3C
    0C18EE7D   8B4D 14          MOV ECX,DWORD PTR SS:[EBP+14]
    0C18EE80   8B55 F8          MOV EDX,DWORD PTR SS:[EBP-8]
    0C18EE83   8911             MOV DWORD PTR DS:[ECX],EDX
    0C18EE85   8BE5             MOV ESP,EBP
    0C18EE87   5D               POP EBP
    0C18EE88   C3               RETN
    ------------------------------------------------------
    ######################################################
    ------------------------------------------------------
    MS Base 00401000
    0B936CB0   55               PUSH EBP
    0B936CB1   8BEC             MOV EBP,ESP
    0B936CB3   6A FF            PUSH -1
    0B936CB5   68 30AC9E0B      PUSH EHSvc.0B9EAC30
    0B936CBA   68 50E09A0B      PUSH EHSvc.0B9AE050
    0B936CBF   64:A1 00000000   MOV EAX,DWORD PTR FS:[0]
    0B936CC5   50               PUSH EAX
    0B936CC6   64:8925 00000000 MOV DWORD PTR FS:[0],ESP
    0B936CCD   83EC 08          SUB ESP,8
    0B936CD0   B8 30120000      MOV EAX,1230
    0B936CD5   E8 26800700      CALL EHSvc.0B9AED00
    0B936CDA   53               PUSH EBX
    0B936CDB   56               PUSH ESI
    0B936CDC   57               PUSH EDI
    0B936CDD   8965 E8          MOV DWORD PTR SS:[EBP-18],ESP
    0B936CE0   898D B8EDFFFF    MOV DWORD PTR SS:[EBP-1248],ECX
    0B936CE6   33DB             XOR EBX,EBX
    0B936CE8   899D C8EDFFFF    MOV DWORD PTR SS:[EBP-1238],EBX
    0B936CEE   889D D8EDFFFF    MOV BYTE PTR SS:[EBP-1228],BL
    0B936CF4   B9 FF030000      MOV ECX,3FF
    0B936CF9   33C0             XOR EAX,EAX
    0B936CFB   8DBD D9EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1227]
    0B936D01   F3:AB            REP STOS DWORD PTR ES:[EDI]
    0B936D03   66:AB            STOS WORD PTR ES:[EDI]
    0B936D05   AA               STOS BYTE PTR ES:[EDI]
    0B936D06   8B75 08          MOV ESI,DWORD PTR SS:[EBP+8]
    0B936D09   3BF3             CMP ESI,EBX
    0B936D0B   0F84 A6010000    JE EHSvc.0B936EB7
    0B936D11   8B45 0C          MOV EAX,DWORD PTR SS:[EBP+C]
    0B936D14   3BC3             CMP EAX,EBX
    0B936D16   0F84 9B010000    JE EHSvc.0B936EB7
    0B936D1C   BA 01000000      MOV EDX,1
    0B936D21   895D FC          MOV DWORD PTR SS:[EBP-4],EBX
    0B936D24   B9 00040000      MOV ECX,400
    0B936D29   8DBD D8EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1228]
    0B936D2F   F3:A5            REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ES>
    0B936D31   C745 FC FFFFFFFF MOV DWORD PTR SS:[EBP-4],-1
    0B936D38   EB 17            JMP SHORT EHSvc.0B936D51
    0B936D3A   B8 01000000      MOV EAX,1
    0B936D3F   C3               RETN
    ===================================================================
    MS Base 00401000
    00C4691A   89D2             MOV EDX,EDX
    00C4691C   89FF             MOV EDI,EDI
    00C4691E   89C0             MOV EAX,EAX
    00C46920   90               NOP
    00C46921   EB 48            JMP SHORT MapleSto.00C4696B
    00C46923   33C0             XOR EAX,EAX
    00C46925   03C2             ADD EAX,EDX
    00C46927   8B55 18          MOV EDX,DWORD PTR SS:[EBP+18]
    00C4692A   83E8 08          SUB EAX,8
    00C4692D   8B02             MOV EAX,DWORD PTR DS:[EDX]
    00C4692F   C1E8 08          SHR EAX,8
    00C46932   33C9             XOR ECX,ECX
    00C46934   8BC8             MOV ECX,EAX
    00C46936   C1E1 08          SHL ECX,8
    00C46939   8B4D 08          MOV ECX,DWORD PTR SS:[EBP+8]
    00C4693C   034D CC          ADD ECX,DWORD PTR SS:[EBP-34]
    00C4693F   33D2             XOR EDX,EDX
    00C46941   8B5D 08          MOV EBX,DWORD PTR SS:[EBP+8]
    00C46944   8A11             MOV DL,BYTE PTR DS:[ECX]
    00C46946   80C2 01          ADD DL,1
    00C46949   8B4D 18          MOV ECX,DWORD PTR SS:[EBP+18]
    00C4694C   8B09             MOV ECX,DWORD PTR DS:[ECX]
    00C4694E   80EA 01          SUB DL,1
    00C46951   33CA             XOR ECX,EDX
    00C46953   81E1 FF000000    AND ECX,0FF
    00C46959   83F1 16          XOR ECX,16
    00C4695C   83F1 16          XOR ECX,16
    00C4695F   33048D 2C17F800  XOR EAX,DWORD PTR DS:[ECX*4+F8172C]
    00C46966   8B55 18          MOV EDX,DWORD PTR SS:[EBP+18]
    00C46969   8902             MOV DWORD PTR DS:[EDX],EAX
    00C4696B  ^E9 88FDFFFF      JMP MapleSto.00C466F8
    00C46970  -E9 04066000      JMP MapleSto.01246F79
    00C46975   2332             AND ESI,DWORD PTR DS:[EDX]
    00C46977   31F0             XOR EAX,ESI
    00C46979   67:FD            STD                                          ; Superfluous prefix
    00C4697B   132D 009AC0D1    ADC EBP,DWORD PTR DS:[D1C09A00]
    00C46981   FF17             CALL DWORD PTR DS:[EDI]
    00C46983   64:BA 2D00835A   MOV EDX,5A83002D                             ; Superfluous prefix
    00C46989   AD               LODS DWORD PTR DS:[ESI]
    00C4698A   00F7             ADD BH,DH
    00C4698C   46               INC ESI
    00C4698D   04 7B            ADD AL,7B
    00C4698F   45               INC EBP
    00C46990   A2 6174C55C      MOV BYTE PTR DS:[5CC57461],AL
    00C46995   4E               DEC ESI
    ===================================================================
    Hackshield module ehsvc 0B911000
    0B936CB0   55               PUSH EBP
    0B936CB1   8BEC             MOV EBP,ESP
    0B936CB3   6A FF            PUSH -1
    0B936CB5   68 30AC9E0B      PUSH EHSvc.0B9EAC30
    0B936CBA   68 50E09A0B      PUSH EHSvc.0B9AE050
    0B936CBF   64:A1 00000000   MOV EAX,DWORD PTR FS:[0]
    0B936CC5   50               PUSH EAX
    0B936CC6   64:8925 00000000 MOV DWORD PTR FS:[0],ESP
    0B936CCD   83EC 08          SUB ESP,8
    0B936CD0   B8 30120000      MOV EAX,1230
    0B936CD5   E8 26800700      CALL EHSvc.0B9AED00
    0B936CDA   53               PUSH EBX
    0B936CDB   56               PUSH ESI
    0B936CDC   57               PUSH EDI
    0B936CDD   8965 E8          MOV DWORD PTR SS:[EBP-18],ESP
    0B936CE0   898D B8EDFFFF    MOV DWORD PTR SS:[EBP-1248],ECX
    0B936CE6   33DB             XOR EBX,EBX
    0B936CE8   899D C8EDFFFF    MOV DWORD PTR SS:[EBP-1238],EBX
    0B936CEE   889D D8EDFFFF    MOV BYTE PTR SS:[EBP-1228],BL
    0B936CF4   B9 FF030000      MOV ECX,3FF
    0B936CF9   33C0             XOR EAX,EAX
    0B936CFB   8DBD D9EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1227]
    0B936D01   F3:AB            REP STOS DWORD PTR ES:[EDI]
    0B936D03   66:AB            STOS WORD PTR ES:[EDI]
    0B936D05   AA               STOS BYTE PTR ES:[EDI]
    0B936D06   8B75 08          MOV ESI,DWORD PTR SS:[EBP+8]
    0B936D09   3BF3             CMP ESI,EBX
    0B936D0B   0F84 A6010000    JE EHSvc.0B936EB7
    0B936D11   8B45 0C          MOV EAX,DWORD PTR SS:[EBP+C]
    0B936D14   3BC3             CMP EAX,EBX
    0B936D16   0F84 9B010000    JE EHSvc.0B936EB7
    0B936D1C   BA 01000000      MOV EDX,1
    0B936D21   895D FC          MOV DWORD PTR SS:[EBP-4],EBX
    0B936D24   B9 00040000      MOV ECX,400
    0B936D29   8DBD D8EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1228]
    0B936D2F   F3:A5            REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ES>
    0B936D31   C745 FC FFFFFFFF MOV DWORD PTR SS:[EBP-4],-1
    0B936D38   EB 17            JMP SHORT EHSvc.0B936D51
    0B936D3A   B8 01000000      MOV EAX,1
    0B936D3F   C3               RETN
    ===================================================================
    Hackshield module ehsvc 0B911000
    0B936CB0   55               PUSH EBP
    0B936CB1   8BEC             MOV EBP,ESP
    0B936CB3   6A FF            PUSH -1
    0B936CB5   68 30AC9E0B      PUSH EHSvc.0B9EAC30
    0B936CBA   68 50E09A0B      PUSH EHSvc.0B9AE050
    0B936CBF   64:A1 00000000   MOV EAX,DWORD PTR FS:[0]
    0B936CC5   50               PUSH EAX
    0B936CC6   64:8925 00000000 MOV DWORD PTR FS:[0],ESP
    0B936CCD   83EC 08          SUB ESP,8
    0B936CD0   B8 30120000      MOV EAX,1230
    0B936CD5   E8 26800700      CALL EHSvc.0B9AED00
    0B936CDA   53               PUSH EBX
    0B936CDB   56               PUSH ESI
    0B936CDC   57               PUSH EDI
    0B936CDD   8965 E8          MOV DWORD PTR SS:[EBP-18],ESP
    0B936CE0   898D B8EDFFFF    MOV DWORD PTR SS:[EBP-1248],ECX
    0B936CE6   33DB             XOR EBX,EBX
    0B936CE8   899D C8EDFFFF    MOV DWORD PTR SS:[EBP-1238],EBX
    0B936CEE   889D D8EDFFFF    MOV BYTE PTR SS:[EBP-1228],BL
    0B936CF4   B9 FF030000      MOV ECX,3FF
    0B936CF9   33C0             XOR EAX,EAX
    0B936CFB   8DBD D9EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1227]
    0B936D01   F3:AB            REP STOS DWORD PTR ES:[EDI]
    0B936D03   66:AB            STOS WORD PTR ES:[EDI]
    0B936D05   AA               STOS BYTE PTR ES:[EDI]
    0B936D06   8B75 08          MOV ESI,DWORD PTR SS:[EBP+8]
    0B936D09   3BF3             CMP ESI,EBX
    0B936D0B   0F84 A6010000    JE EHSvc.0B936EB7
    0B936D11   8B45 0C          MOV EAX,DWORD PTR SS:[EBP+C]
    0B936D14   3BC3             CMP EAX,EBX
    0B936D16   0F84 9B010000    JE EHSvc.0B936EB7
    0B936D1C   BA 01000000      MOV EDX,1
    0B936D21   895D FC          MOV DWORD PTR SS:[EBP-4],EBX
    0B936D24   B9 00040000      MOV ECX,400
    0B936D29   8DBD D8EDFFFF    LEA EDI,DWORD PTR SS:[EBP-1228]
    0B936D2F   F3:A5            REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ES>
    0B936D31   C745 FC FFFFFFFF MOV DWORD PTR SS:[EBP-4],-1
    0B936D38   EB 17            JMP SHORT EHSvc.0B936D51
    0B936D3A   B8 01000000      MOV EAX,1
    0B936D3F   C3               RETN

    This isn't something you can copy paste and compile, if you know what to do you can check it out via the dump and program a bypass with this information.


    PS: This is code base, so -0x1000 would give you the module base.

    PPS: This is for GMS
    Last edited by scriptkiddy; 12-17-2011 at 05:23 PM.

  2. #2
    Dreamer's Avatar
    Join Date
    Feb 2009
    Gender
    male
    Location
    Seattle
    Posts
    8,745
    Reputation
    393
    Thanks
    1,481
    My Mood
    Bitchy
    Looks interesting. If only we had a bypass coder here.
    Resource Team: Feb/5/2012 - May/5/2012
    Middleman: April/25/2012 - September/16/12


  3. #3
    yiraeryu12345's Avatar
    Join Date
    Apr 2011
    Gender
    male
    Location
    In Lols.
    Posts
    29
    Reputation
    10
    Thanks
    3
    My Mood
    Bored
    nice n thnx +

  4. #4
    Dreamer's Avatar
    Join Date
    Feb 2009
    Gender
    male
    Location
    Seattle
    Posts
    8,745
    Reputation
    393
    Thanks
    1,481
    My Mood
    Bitchy
    Quote Originally Posted by yiraeryu12345 View Post
    nice n thnx +
    Do you even know what to do with it?
    Resource Team: Feb/5/2012 - May/5/2012
    Middleman: April/25/2012 - September/16/12


Similar Threads

  1. [Release]PB Bypass
    By tellmehome in forum WarRock - International Hacks
    Replies: 40
    Last Post: 05-22-2007, 09:43 AM
  2. [Release] PB Bypass v2
    By tellmehome in forum WarRock - International Hacks
    Replies: 57
    Last Post: 05-21-2007, 08:35 AM
  3. [release] new bypass !!
    By W-Hackz in forum WarRock - International Hacks
    Replies: 30
    Last Post: 05-09-2007, 12:59 PM
  4. [release] PUBLIC BYPASS :)
    By loky614 in forum WarRock - International Hacks
    Replies: 16
    Last Post: 05-08-2007, 08:45 AM
  5. [Release]Punkbuster BYPASS
    By Warlordrody in forum WarRock - International Hacks
    Replies: 187
    Last Post: 02-24-2007, 01:11 PM