please /.
iwant edit server.dat
please....please
iwant edit server.dat
please....please
00432C57 |. FF15 84575200 CALL DWORD PTR DS:[<&WS2_32.#11>] ; \inet_addr 00432C5D |. 83F8 FF CMP EAX,-1 00432C60 |. 74 08 JE SHORT Conquer.00432C6A
004E405A . 3C 7F CMP AL,7F
sorry ..ican't find win32_32.inet_addressQuote:
- Open Conquer.exe with Ollydbg
- Right click on the main CPU thread > Search for all intermodular calls
- Search for "WS32_32.inet_adress" (there are three of them)
- Double click on one of them, and under two instructions you'll find something like
- Below the JE SHORT is an instructionCode:00432C57 |. FF15 84575200 CALL DWORD PTR DS:[<&WS2_32.#11>] ; \inet_addr 00432C5D |. 83F8 FF CMP EAX,-1 00432C60 |. 74 08 JE SHORT Conquer.00432C6A
- Right click > Binary > NOPCode:004E405A . 3C 7F CMP AL,7F
- You can just NOP just two of inet_adress not all three (I'd recommend to NOP the first two)
- Right click > Copy to executable > All selection
- Save your file (be sure to make a backup before)
Now you have a Conquer.exe that bypasses the Server.dat check.
Link's not working. Please check my last two replies, I gave you the link to the Nullable's CO Loader. Use that ! Don't force me to +1 again...Quote:
[Only registered and activated users can see links. Click Here To Register...]
Quote:
Link's not working. Please check my last two replies, I gave you the link to the Nullable's CO Loader. Use that ! Don't force me to +1 again...