[2025-11-14 22:17:46.018] [INFO] Virtual terminal processing enabled.
[2025-11-14 22:17:46.025] [INFO] Successfully enabled SE_DEBUG_NAME privilege for the current process.
[2025-11-14 22:17:46.103] [INFO] Direct3D9 device created successfully.
[2025-11-14 22:17:46.186] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:46.191] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:46.194] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:17:47.870] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:17:47.871] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:17:47.872] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:17:48.636] [INFO] Attempting to open process: gameclient.exe (PID: 7544)
[2025-11-14 22:17:48.636] [INFO] Successfully opened process gameclient.exe (PID: 7544). Handle: 0x470
[2025-11-14 22:17:48.657] [INFO] Identified main thread ID for PID 7544: 8628
[2025-11-14 22:17:48.657] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:17:48.658] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:17:48.658] [INFO] Process (handle: 0x470) is 32-bit (running under WOW64).
[2025-11-14 22:17:48.658] [INFO] Target process is not 64-bit.
[2025-11-14 22:17:48.660] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:17:48.660] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:17:48.682] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:17:48.694] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:17:48.711] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:17:48.712] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:17:54.368] [INFO] Selected script for injection: C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py
[2025-11-14 22:18:01.858] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:01.859] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:01.860] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:09.252] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:09.253] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:09.255] [INFO] Process scan complete. Found 0 processes matching criteria.
[2025-11-14 22:18:10.151] [INFO] Updating with Metin-specific process list.
[2025-11-14 22:18:10.152] [INFO] Scanning for processes with window class name containing 'eter -'...
[2025-11-14 22:18:10.154] [INFO] Process scan complete. Found 1 processes matching criteria.
[2025-11-14 22:18:11.150] [INFO] Attempting to open process: gameclient.exe (PID: 9884)
[2025-11-14 22:18:11.151] [INFO] Successfully opened process gameclient.exe (PID: 9884). Handle: 0xe28
[2025-11-14 22:18:11.173] [INFO] Identified main thread ID for PID 9884: 3588
[2025-11-14 22:18:11.174] [INFO] Main module base: 0x1000000, Size: 0x7fd000
[2025-11-14 22:18:11.175] [INFO] Got module info: Base=0x1000000, Size=0x7fd000
[2025-11-14 22:18:11.176] [INFO] Process (handle: 0xe28) is 32-bit (running under WOW64).
[2025-11-14 22:18:11.177] [INFO] Target process is not 64-bit.
[2025-11-14 22:18:11.179] [INFO] Module 'python27.dll' found at address: 0x1e000000
[2025-11-14 22:18:11.181] [INFO] python27.dll found in target process at 0x1e000000. Attempting to get export addresses.
[2025-11-14 22:18:11.205] [INFO] Found export 'PyRun_StringFlags' at address: 0x1e114790 in module 0x1e000000 (RVA: 0x114790, Ordinal: 587)
[2025-11-14 22:18:11.217] [INFO] Found export 'PyImport_AddModule' at address: 0x1e0fdf50 in module 0x1e000000 (RVA: 0xfdf50, Ordinal: 312)
[2025-11-14 22:18:11.235] [INFO] Found export 'PyModule_GetDict' at address: 0x1e0a8fb0 in module 0x1e000000 (RVA: 0xa8fb0, Ordinal: 425)
[2025-11-14 22:18:11.236] [INFO] All required Python 2.7 exports found.
[2025-11-14 22:18:12.324] [INFO] Attempting Python script injection: 'C:\Users\Ahmed El Helow\Desktop\Mt2Kings\iPUSH.py' into PID: 9884
[2025-11-14 22:18:12.325] [INFO] Using python27.dll export injection method.
[2025-11-14 22:18:12.326] [INFO] Allocated 164 bytes (prot: 0x4) at 0x96b0000 in process handle 0xe28
[2025-11-14 22:18:12.327] [INFO] Allocated 9 bytes (prot: 0x4) at 0x9ce0000 in process handle 0xe28
[2025-11-14 22:18:12.328] [INFO] Py27Inject: Loader script (164 bytes) and __main__ (9 bytes) written to target process.
[2025-11-14 22:18:12.329] [INFO] Allocated 55 bytes (prot: 0x40) at 0x9d10000 in process handle 0xe28
[2025-11-14 22:18:12.330] [INFO] Py27Inject: Shellcode (55 bytes) written to 0x9d10000
[2025-11-14 22:18:12.330] [INFO] Py27Inject: CreateRemoteThread success. Waiting for thread...
[2025-11-14 22:18:14.034] [INFO] Py27Inject: Remote thread finished. Exit code: 3221225477 (Check target console/log for Python output/errors)
[2025-11-14 22:18:14.035] [ERROR] VirtualFreeEx failed for address 0x9d10000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.036] [ERROR] VirtualFreeEx failed for address 0x96b0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.037] [ERROR] VirtualFreeEx failed for address 0x9ce0000 in process handle 0xe28. Error: 5
[2025-11-14 22:18:14.038] [INFO] Py27Inject: Freed allocated memory (loader, __main__, shellcode).
[2025-11-14 22:18:14.038] [INFO] Python 2.7 script injection reported success.
How i fix that please ? the server use c shield