• 0

Editing a file to remove 'spam'?


Question

I downloaded Auto Replier for Jedi Academy, but it will spam text every time I join a game. Is there a way to remove the code that does that? I can see some of the text when I open it is a hex editor, but I have had problems in the past where it won't load the program again.

Link to comment
Share on other sites

6 answers to this question

Recommended Posts

  • 0

It only shows some text, not all of it and it doesn't show the whole code. I was looking at the file and it looks like it was made with Visual Basic 6 with the program Visual Studio. I have Visual Studio .NET for Visual Basis .NET. Any way I can open it with that?

Link to comment
Share on other sites

  • 0

So I need to fine a program that will compile the code?

It looks like this:

Disassembly of File: C:\AutoReplier.exe

T.DateStamp = 408DA8B4: Mon Apr 26 17:26:28 2004

Code Offset = 00001000, Code Size = 0001A000

Data Offset = 0001B000, Data Size = 00001000

Number of Objects = 0003 (dec), Imagebase = 00400000h

  Object01:  .text  RVA: 00001000 Offset: 00001000 Size: 0001A000 Flags: 60000020

  Object02:  .data  RVA: 0001B000 Offset: 0001B000 Size: 00001000 Flags: C0000040

  Object03:  .rsrc  RVA: 0001E000 Offset: 0001C000 Size: 00001000 Flags: 40000040

+++++++++++++++++++ RESOURCE INFORMATION +++++++++++++++++++

Number of Resource Types =    3 (decimal)

  Resource Type 001: RT_ICON 

  Resource Type 002: RT_GROUP_ICON 

  Resource Type 003: RT_VERSION

+++++++++++++++++ ICON INFORMATION +++++++++++++++++++

Number of Icons =    1 (decimal)

Name: IconId_7531       

+++++++++++++++++++ IMPORTED FUNCTIONS +++++++++++++++++++

Number of Imported Modules =    1 (decimal)

  Import Module 001: MSVBVM60.DLL

and
:004138DF 8965F4                  mov dword[ebp-0C], esp

:004138E2 C745F8B0184000          mov dword[ebp-08], 004018B0

:004138E9 8B7508                  mov esi, dword[ebp+08]

:004138EC 8BC6                    mov eax, esi

:004138EE 83E001                  and eax, 001

:004138F1 8945FC                  mov dword[ebp-04], eax

:004138F4 83E6FE                  and esi, -002

:004138F7 56                      push esi

:004138F8 897508                  mov dword[ebp+08], esi

:004138FB 8B0E                    mov ecx, dword[esi]

:004138FD FF5104                  call dword[ecx+04]

:00413900 66C74658FFFF            mov word[esi+58], FFFF

:00413906 C745FC00000000          mov dword[ebp-04], 00000000

:0041390D 8B4508                  mov eax, dword[ebp+08]

:00413910 50                      push eax

:00413911 8B10                    mov edx, dword[eax]

:00413913 FF5208                  call dword[edx+08]

:00413916 8B45FC                  mov eax, dword[ebp-04]

:00413919 8B4DEC                  mov ecx, dword[ebp-14]

:0041391C 5F                      pop edi

:0041391D 5E                      pop esi

:0041391E 64890D00000000          mov dword fs:[00000000], ecx

:00413925 5B                      pop ebx

:00413926 8BE5                    mov esp, ebp

:00413928 5D                      pop ebp

:00413929 C20400                  ret 0004

That is just a small bit of it, there is quite a lot there.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.