Simple question - number

Newbie Spellweaver
Joined
Nov 16, 2008
Messages
13
Reaction score
0
Hello...I want to know how can I take out the number 1...look the screenshot.

Juca - Simple question - number - RaGEZONE Forums


Thanks...Bye
 
That's just the way it works.

To change it you'll need to find out where Gunz get's the strings of server names. Or rather, where the array numeric gets added.

If your lucky it's in the form of '%s %d', and you can remove the %d. Otherwise you'll need to search back further to find out where it adds the numeric.


Either way it's an asm edit.
 
Upvote 0
its a asm edit
heres the code

Code:
0043AC50  /$ 55             PUSH EBP
0043AC51  |. 8BEC           MOV EBP,ESP
0043AC53  |. 83E4 F8        AND ESP,FFFFFFF8
0043AC56  |. 81EC 9C000000  SUB ESP,9C
0043AC5C  |. A1 F0696500    MOV EAX,DWORD PTR DS:[6569F0]
0043AC61  |. 53             PUSH EBX
0043AC62  |. 56             PUSH ESI
0043AC63  |. 57             PUSH EDI
0043AC64  |. 83EC 1C        SUB ESP,1C
0043AC67  |. 8BF1           MOV ESI,ECX
0043AC69  |. 8BCC           MOV ECX,ESP
0043AC6B  |. 896424 34      MOV DWORD PTR SS:[ESP+34],ESP
0043AC6F  |. 6A 0E          PUSH 0E
0043AC71  |. 33FF           XOR EDI,EDI
0043AC73  |. C741 18 0F0000>MOV DWORD PTR DS:[ECX+18],0F
0043AC7A  |. 8979 14        MOV DWORD PTR DS:[ECX+14],EDI
0043AC7D  |. 68 18B85E00    PUSH theduel.005EB818                    ;  ASCII "SelectedServer"
0043AC82  |. 898424 C800000>MOV DWORD PTR SS:[ESP+C8],EAX
0043AC89  |. 897424 40      MOV DWORD PTR SS:[ESP+40],ESI
0043AC8D  |. C641 04 00     MOV BYTE PTR DS:[ECX+4],0
0043AC91  |. E8 1A6FFCFF    CALL theduel.00401BB0
0043AC96  |. 8D8E E0240000  LEA ECX,DWORD PTR DS:[ESI+24E0]
0043AC9C  |. E8 0F201100    CALL theduel.0054CCB0
0043ACA1  |. 8BD8           MOV EBX,EAX
0043ACA3  |. 3BDF           CMP EBX,EDI
0043ACA5  |. 895C24 14      MOV DWORD PTR SS:[ESP+14],EBX
0043ACA9  |. 0F84 A7010000  JE theduel.0043AE56
0043ACAF  |. 8B83 C0020000  MOV EAX,DWORD PTR DS:[EBX+2C0]
0043ACB5  |. 8BCB           MOV ECX,EBX
0043ACB7  |. 894424 18      MOV DWORD PTR SS:[ESP+18],EAX
0043ACBB  |. E8 D0DCFEFF    CALL theduel.00428990
0043ACC0  |. E8 5B100700    CALL theduel.004ABD20
0043ACC5  |. 84C0           TEST AL,AL
0043ACC7  |. 74 2A          JE SHORT theduel.0043ACF3
0043ACC9  |. 57             PUSH EDI
0043ACCA  |. 6A 01          PUSH 1
0043ACCC  |. 68 E8030000    PUSH 3E8
0043ACD1  |. 57             PUSH EDI
0043ACD2  |. 6A 01          PUSH 1
0043ACD4  |. 57             PUSH EDI
0043ACD5  |. 68 6C685E00    PUSH theduel.005E686C
0043ACDA  |. 68 A6240000    PUSH 24A6
0043ACDF  |. E8 0CD80C00    CALL theduel.005084F0
0043ACE4  |. 8BC8           MOV ECX,EAX
0043ACE6  |. E8 85490900    CALL theduel.004CF670
0043ACEB  |. 50             PUSH EAX
0043ACEC  |. 8BCB           MOV ECX,EBX
0043ACEE  |. E8 CDDEFEFF    CALL theduel.00428BC0
0043ACF3  |> 397D 08        CMP DWORD PTR SS:[EBP+8],EDI
0043ACF6  |. 0F8E 3D010000  JLE theduel.0043AE39
0043ACFC  |. 397D 0C        CMP DWORD PTR SS:[EBP+C],EDI
0043ACFF  |. 0F84 34010000  JE theduel.0043AE39
0043AD05  |. 897C24 10      MOV DWORD PTR SS:[ESP+10],EDI
0043AD09  |. 8DA424 0000000>LEA ESP,DWORD PTR SS:[ESP]
0043AD10  |> 8B4D 0C        /MOV ECX,DWORD PTR SS:[EBP+C]
0043AD13  |. 57             |PUSH EDI
0043AD14  |. 51             |PUSH ECX
0043AD15  |. E8 B6C20F00    |CALL theduel.00536FD0
0043AD1A  |. 8BF0           |MOV ESI,EAX
0043AD1C  |. 83C4 08        |ADD ESP,8
0043AD1F  |. 85F6           |TEST ESI,ESI
0043AD21  |. 75 13          |JNZ SHORT theduel.0043AD36
0043AD23  |. 57             |PUSH EDI
0043AD24  |. 68 C8B75E00    |PUSH theduel.005EB7C8
0043AD29  |. E8 32680F00    |CALL theduel.00531560
0043AD2E  |. 83C4 08        |ADD ESP,8
0043AD31  |. E9 EF000000    |JMP theduel.0043AE25
0043AD36  |> 8B06           |MOV EAX,DWORD PTR DS:[ESI]
0043AD38  |. 50             |PUSH EAX
0043AD39  |. FF15 A0655E00  |CALL DWORD PTR DS:[<&WS2_32.#12>]       ;  WS2_32.inet_ntoa
0043AD3F  |. 8BD8           |MOV EBX,EAX
0043AD41  |. 33C0           |XOR EAX,EAX
0043AD43  |. C64424 20 00   |MOV BYTE PTR SS:[ESP+20],0
0043AD48  |. B9 1F000000    |MOV ECX,1F
0043AD4D  |. 8D7C24 21      |LEA EDI,DWORD PTR SS:[ESP+21]
0043AD51  |. F3:AB          |REP STOS DWORD PTR ES:[EDI]
0043AD53  |. 66:AB          |STOS WORD PTR ES:[EDI]
0043AD55  |. AA             |STOS BYTE PTR ES:[EDI]
0043AD56  |. 8A46 0D        |MOV AL,BYTE PTR DS:[ESI+D]
0043AD59  |. 3C 01          |CMP AL,1
0043AD5B  |. 75 2B          |JNZ SHORT theduel.0043AD88
0043AD5D  |. 68 A6240000    |PUSH 24A6
0043AD62  |. E8 89D70C00    |CALL theduel.005084F0
0043AD67  |. 8BC8           |MOV ECX,EAX
0043AD69  |. E8 02490900    |CALL theduel.004CF670
0043AD6E  |. 0FB656 08      |MOVZX EDX,BYTE PTR DS:[ESI+8]
0043AD72  |. 52             |PUSH EDX
0043AD73  |. 50             |PUSH EAX
0043AD74  |. 8D4424 28      |LEA EAX,DWORD PTR SS:[ESP+28]
0043AD78  |. 68 BCB75E00    |PUSH theduel.005EB7BC                   ;  ASCII "%s %d"
0043AD7D  |. 50             |PUSH EAX
0043AD7E  |. E8 8A691300    |CALL theduel.0057170D
0043AD83  |. 83C4 10        |ADD ESP,10
0043AD86  |. EB 6B          |JMP SHORT theduel.0043ADF3
0043AD88  |> 3C 02          |CMP AL,2
0043AD8A  |. 75 2B          |JNZ SHORT theduel.0043ADB7
0043AD8C  |. 68 A7240000    |PUSH 24A7
0043AD91  |> E8 5AD70C00    |CALL theduel.005084F0
0043AD96  |. 8BC8           |MOV ECX,EAX
0043AD98  |. E8 D3480900    |CALL theduel.004CF670
0043AD9D  |. 0FB64E 08      |MOVZX ECX,BYTE PTR DS:[ESI+8]
0043ADA1  |. 51             |PUSH ECX
0043ADA2  |. 50             |PUSH EAX
0043ADA3  |. 8D5424 28      |LEA EDX,DWORD PTR SS:[ESP+28]
0043ADA7  |. 68 BCB75E00    |PUSH theduel.005EB7BC                   ;  ASCII "%s %d"
0043ADAC  |. 52             |PUSH EDX
0043ADAD  |. E8 5B691300    |CALL theduel.0057170D
0043ADB2  |. 83C4 10        |ADD ESP,10
0043ADB5  |. EB 3C          |JMP SHORT theduel.0043ADF3
0043ADB7  |> 3C 03          |CMP AL,3
0043ADB9  |. 75 07          |JNZ SHORT theduel.0043ADC2
0043ADBB  |. 68 A8240000    |PUSH 24A8
0043ADC0  |.^EB CF          |JMP SHORT theduel.0043AD91
0043ADC2  |> 3C 04          |CMP AL,4
0043ADC4  |. 75 07          |JNZ SHORT theduel.0043ADCD
0043ADC6  |. 68 A9240000    |PUSH 24A9
0043ADCB  |.^EB C4          |JMP SHORT theduel.0043AD91
0043ADCD  |> 3C 05          |CMP AL,5
0043ADCF  |. 75 07          |JNZ SHORT theduel.0043ADD8
0043ADD1  |. 68 AA240000    |PUSH 24AA
0043ADD6  |.^EB B9          |JMP SHORT theduel.0043AD91
0043ADD8  |> 3C 06          |CMP AL,6
0043ADDA  |. 75 41          |JNZ SHORT theduel.0043AE1D
0043ADDC  |. 0FB646 08      |MOVZX EAX,BYTE PTR DS:[ESI+8]
0043ADE0  |. 50             |PUSH EAX
0043ADE1  |. 8D4C24 24      |LEA ECX,DWORD PTR SS:[ESP+24]
0043ADE5  |. 68 ACB75E00    |PUSH theduel.005EB7AC                   ;  ASCII "Test Server %d"
0043ADEA  |. 51             |PUSH ECX
0043ADEB  |. E8 1D691300    |CALL theduel.0057170D
0043ADF0  |. 83C4 0C        |ADD ESP,0C
0043ADF3  |> 0FBF46 09      |MOVSX EAX,WORD PTR DS:[ESI+9]
0043ADF7  |. 0FBF4E 0B      |MOVSX ECX,WORD PTR DS:[ESI+B]
0043ADFB  |. 33D2           |XOR EDX,EDX
0043ADFD  |. 8A56 0E        |MOV DL,BYTE PTR DS:[ESI+E]
0043AE00  |. 6A 00          |PUSH 0
0043AE02  |. 52             |PUSH EDX
0043AE03  |. 0FBE56 0D      |MOVSX EDX,BYTE PTR DS:[ESI+D]
0043AE07  |. 50             |PUSH EAX
0043AE08  |. 8B46 04        |MOV EAX,DWORD PTR DS:[ESI+4]
0043AE0B  |. 51             |PUSH ECX
0043AE0C  |. 52             |PUSH EDX
0043AE0D  |. 50             |PUSH EAX
0043AE0E  |. 53             |PUSH EBX
0043AE0F  |. 8D4C24 3C      |LEA ECX,DWORD PTR SS:[ESP+3C]
0043AE13  |. 51             |PUSH ECX
0043AE14  |. 8B4C24 34      |MOV ECX,DWORD PTR SS:[ESP+34]
0043AE18  |. E8 A3DDFEFF    |CALL theduel.00428BC0
0043AE1D  |> 8B7C24 10      |MOV EDI,DWORD PTR SS:[ESP+10]
0043AE21  |. 8B5C24 14      |MOV EBX,DWORD PTR SS:[ESP+14]
0043AE25  |> 8B45 08        |MOV EAX,DWORD PTR SS:[EBP+8]
0043AE28  |. 47             |INC EDI
0043AE29  |. 3BF8           |CMP EDI,EAX
0043AE2B  |. 897C24 10      |MOV DWORD PTR SS:[ESP+10],EDI
0043AE2F  |.^0F8C DBFEFFFF  \JL theduel.0043AD10
0043AE35  |. 8B7424 1C      MOV ESI,DWORD PTR SS:[ESP+1C]
0043AE39  |> 8B5424 18      MOV EDX,DWORD PTR SS:[ESP+18]
0043AE3D  |. 52             PUSH EDX
0043AE3E  |. 8BCB           MOV ECX,EBX
0043AE40  |. E8 8BDAFEFF    CALL theduel.004288D0
0043AE45  |. FF15 5C655E00  CALL DWORD PTR DS:[<&WINMM.timeGetTime>] ;  WINMM.timeGetTime
0043AE4B  |. 05 10270000    ADD EAX,2710
0043AE50  |. 8986 E4250000  MOV DWORD PTR DS:[ESI+25E4],EAX
0043AE56  |> 8B8C24 A400000>MOV ECX,DWORD PTR SS:[ESP+A4]
0043AE5D  |. E8 CC621300    CALL theduel.0057112E
0043AE62  |. 5F             POP EDI
0043AE63  |. 5E             POP ESI
0043AE64  |. 5B             POP EBX
0043AE65  |. 8BE5           MOV ESP,EBP
0043AE67  |. 5D             POP EBP
0043AE68  \. C2 0800        RETN 8


download ollydbg - Google it
File --> Open--> path to ur runnable
right click --> Go To --> Expression --> 005EB7BC


Code:
005EB7B8   25 64000025      AND EAX,25000064
005EB7BD   73 20            JNB SHORT theduel.005EB7DF
005EB7BF   25 64000000      AND EAX,64

select those 3 lines
right click choose binary
The binary will be

Code:
%d..%s %d...
Change it to

Code:
%d..%s   ...
or you can alter the binary code from 25 73 20 25 64 to 25 73 20 00 00

Right Click --> Copy To Executable --> All Modifications --> Save
 
Upvote 0
Back