Register for your free account! | Forgot your password?

You last visited: Today at 04:46

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Int] Bot for all Classes

Discussion on [Int] Bot for all Classes within the Kal Hacks, Bots, Cheats & Exploits forum part of the Kal Online category.

Closed Thread
 
Old 06/09/2011, 02:41   #136
 
elite*gold: 0
Join Date: Oct 2009
Posts: 26
Received Thanks: 1
so endlich main .. mal schaun ob was "gutes" bei rumkommt :>
0x01 is offline  
Old 06/09/2011, 03:10   #137
 
DerKleineDarky's Avatar
 
elite*gold: 0
Join Date: May 2008
Posts: 682
Received Thanks: 208
Quote:
Originally Posted by 0x01 View Post
so endlich main .. mal schaun ob was "gutes" bei rumkommt :>
naja die sollten eig genau wissen wie sie das fixen können, war ja von anfang an das ziel des releases ^^
naja aber da wir ja inixsoft kennen, bleibt es spannend
DerKleineDarky is offline  
Old 06/09/2011, 03:16   #138
 
meak1's Avatar
 
elite*gold: 220
Join Date: Jun 2007
Posts: 3,768
Received Thanks: 1,126
dlsound.dll check -> skill
meak1 is offline  
Old 06/09/2011, 03:16   #139
 
elite*gold: 0
Join Date: Oct 2009
Posts: 26
Received Thanks: 1
da muss einiges gefixt werden

Code:
=====================================================
PROCESS NAME:  engine.exe
-----------------------------------------------------
  Process ID        = 0x000010A8
  Thread count      = 17
  Parent process ID = 0x00000874
  Priority base     = 8
  Priority class    = 32

     MODULE NAME:     engine.exe
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\engine.exe
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x00400000
     Base size      = 7356416

     MODULE NAME:     ntdll.dll
     Executable     = C:\Windows\SysWOW64\ntdll.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x77460000
     Base size      = 1572864

     MODULE NAME:     kernel32.dll
     Executable     = C:\Windows\syswow64\kernel32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75ED0000
     Base size      = 1048576

     MODULE NAME:     KERNELBASE.dll
     Executable     = C:\Windows\syswow64\KERNELBASE.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x761C0000
     Base size      = 286720

     MODULE NAME:     USER32.dll
     Executable     = C:\Windows\syswow64\USER32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x760C0000
     Base size      = 1048576

     MODULE NAME:     GDI32.dll
     Executable     = C:\Windows\syswow64\GDI32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75970000
     Base size      = 589824

     MODULE NAME:     LPK.dll
     Executable     = C:\Windows\syswow64\LPK.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x77430000
     Base size      = 40960

     MODULE NAME:     USP10.dll
     Executable     = C:\Windows\syswow64\USP10.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x76210000
     Base size      = 643072

     MODULE NAME:     msvcrt.dll
     Executable     = C:\Windows\syswow64\msvcrt.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75590000
     Base size      = 704512

     MODULE NAME:     ADVAPI32.dll
     Executable     = C:\Windows\syswow64\ADVAPI32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75880000
     Base size      = 655360

     MODULE NAME:     sechost.dll
     Executable     = C:\Windows\SysWOW64\sechost.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75570000
     Base size      = 102400

     MODULE NAME:     RPCRT4.dll
     Executable     = C:\Windows\syswow64\RPCRT4.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x75650000
     Base size      = 983040

     MODULE NAME:     SspiCli.dll
     Executable     = C:\Windows\syswow64\SspiCli.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x74FD0000
     Base size      = 393216

     MODULE NAME:     CRYPTBASE.dll
     Executable     = C:\Windows\syswow64\CRYPTBASE.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0xFFFF
     Ref count (p)  = 0xFFFF
     Base address   = 0x74FC0000
     Base size      = 49152

     MODULE NAME:     IMM32.DLL
     Executable     = C:\Windows\system32\IMM32.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0006
     Ref count (p)  = 0x0006
     Base address   = 0x75090000
     Base size      = 393216

     MODULE NAME:     MSCTF.dll
     Executable     = C:\Windows\syswow64\MSCTF.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0003
     Ref count (p)  = 0x0003
     Base address   = 0x75FD0000
     Base size      = 835584

     MODULE NAME:     uxtheme.dll
     Executable     = C:\Windows\system32\uxtheme.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x72A00000
     Base size      = 524288

     MODULE NAME:     HsSrv.dll
     Executable     = C:\Windows\SysWOW64\HsSrv.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x10000000
     Base size      = 217088

     MODULE NAME:     WINMM.dll
     Executable     = C:\Windows\SysWOW64\WINMM.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0009
     Ref count (p)  = 0x0009
     Base address   = 0x732E0000
     Base size      = 204800

     MODULE NAME:     DSOUND.dll
     Executable     = C:\Windows\SysWOW64\DSOUND.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0003
     Ref count (p)  = 0x0003
     Base address   = 0x72420000
     Base size      = 466944

     MODULE NAME:     ole32.dll
     Executable     = C:\Windows\syswow64\ole32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x001E
     Ref count (p)  = 0x001E
     Base address   = 0x762B0000
     Base size      = 1425408

     MODULE NAME:     POWRPROF.dll
     Executable     = C:\Windows\SysWOW64\POWRPROF.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0004
     Ref count (p)  = 0x0004
     Base address   = 0x73970000
     Base size      = 151552

     MODULE NAME:     SETUPAPI.dll
     Executable     = C:\Windows\syswow64\SETUPAPI.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0006
     Ref count (p)  = 0x0006
     Base address   = 0x751F0000
     Base size      = 1691648

     MODULE NAME:     CFGMGR32.dll
     Executable     = C:\Windows\syswow64\CFGMGR32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0017
     Ref count (p)  = 0x0017
     Base address   = 0x75390000
     Base size      = 159744

     MODULE NAME:     OLEAUT32.dll
     Executable     = C:\Windows\syswow64\OLEAUT32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0011
     Ref count (p)  = 0x0011
     Base address   = 0x75DD0000
     Base size      = 585728

     MODULE NAME:     DEVOBJ.dll
     Executable     = C:\Windows\syswow64\DEVOBJ.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0005
     Ref count (p)  = 0x0005
     Base address   = 0x760A0000
     Base size      = 73728

     MODULE NAME:     VERSION.dll
     Executable     = C:\Windows\SysWOW64\VERSION.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0008
     Ref count (p)  = 0x0008
     Base address   = 0x732D0000
     Base size      = 36864

     MODULE NAME:     dwmapi.dll
     Executable     = C:\Windows\system32\dwmapi.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0005
     Ref count (p)  = 0x0005
     Base address   = 0x72660000
     Base size      = 77824

     MODULE NAME:     COMCTL32.dll
     Executable     = C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7600.16385_none_ebf82fc36c758ad5\COMCTL32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0004
     Ref count (p)  = 0x0004
     Base address   = 0x75780000
     Base size      = 540672

     MODULE NAME:     comdlg32.dll
     Executable     = C:\Windows\syswow64\comdlg32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x75B50000
     Base size      = 503808

     MODULE NAME:     SHLWAPI.dll
     Executable     = C:\Windows\syswow64\SHLWAPI.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0009
     Ref count (p)  = 0x0009
     Base address   = 0x75030000
     Base size      = 356352

     MODULE NAME:     SHELL32.dll
     Executable     = C:\Windows\syswow64\SHELL32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0005
     Ref count (p)  = 0x0005
     Base address   = 0x76410000
     Base size      = 12881920

     MODULE NAME:     ws2_32.dll
     Executable     = C:\Windows\syswow64\ws2_32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x000A
     Ref count (p)  = 0x000A
     Base address   = 0x75740000
     Base size      = 217088

     MODULE NAME:     NSI.dll
     Executable     = C:\Windows\syswow64\NSI.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x000E
     Ref count (p)  = 0x000E
     Base address   = 0x75640000
     Base size      = 24576

     MODULE NAME:     inetmib1.dll
     Executable     = C:\Windows\system32\inetmib1.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50210000
     Base size      = 61440

     MODULE NAME:     IPHLPAPI.DLL
     Executable     = C:\Windows\system32\IPHLPAPI.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x73A10000
     Base size      = 114688

     MODULE NAME:     WINNSI.DLL
     Executable     = C:\Windows\system32\WINNSI.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x73A00000
     Base size      = 28672

     MODULE NAME:     snmpapi.dll
     Executable     = C:\Windows\system32\snmpapi.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x502E0000
     Base size      = 36864

     MODULE NAME:     profapi.dll
     Executable     = C:\Windows\system32\profapi.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x73AB0000
     Base size      = 45056

     MODULE NAME:     dbghelp.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\dbghelp.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04CA0000
     Base size      = 856064

     MODULE NAME:     MSIMG32.dll
     Executable     = C:\Windows\system32\MSIMG32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x716B0000
     Base size      = 20480

     MODULE NAME:     d3dx9_29.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\d3dx9_29.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x05560000
     Base size      = 2433024

     MODULE NAME:     d3d9.dll
     Executable     = C:\Windows\system32\d3d9.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x606B0000
     Base size      = 1847296

     MODULE NAME:     d3d8thk.dll
     Executable     = C:\Windows\system32\d3d8thk.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x6B9E0000
     Base size      = 24576

     MODULE NAME:     EhSvc.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\EhSvc.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x05D50000
     Base size      = 5021696

     MODULE NAME:     imagehlp.dll
     Executable     = C:\Windows\syswow64\imagehlp.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x75810000
     Base size      = 172032

     MODULE NAME:     WININET.dll
     Executable     = C:\Windows\syswow64\WININET.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x750F0000
     Base size      = 999424

     MODULE NAME:     Normaliz.dll
     Executable     = C:\Windows\syswow64\Normaliz.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x75B40000
     Base size      = 12288

     MODULE NAME:     urlmon.dll
     Executable     = C:\Windows\syswow64\urlmon.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x75A00000
     Base size      = 1265664

     MODULE NAME:     CRYPT32.dll
     Executable     = C:\Windows\syswow64\CRYPT32.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0003
     Ref count (p)  = 0x0003
     Base address   = 0x75450000
     Base size      = 1163264

     MODULE NAME:     MSASN1.dll
     Executable     = C:\Windows\syswow64\MSASN1.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0004
     Ref count (p)  = 0x0004
     Base address   = 0x75870000
     Base size      = 49152

     MODULE NAME:     iertutil.dll
     Executable     = C:\Windows\syswow64\iertutil.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x75BD0000
     Base size      = 2068480

     MODULE NAME:     362b2bd8bd38.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\362b2bd8bd38.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50070000
     Base size      = 286720

     MODULE NAME:     31512de2c088.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\31512de2c088.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50020000
     Base size      = 286720

     MODULE NAME:     97bb2f581928.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\97bb2f581928.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x77E20000
     Base size      = 1572864

     MODULE NAME:     psapi.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\psapi.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x00BA0000
     Base size      = 45056

     MODULE NAME:     12453aee9290.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\12453aee9290.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x00E20000
     Base size      = 45056

     MODULE NAME:     ec0c408ff2a8.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\ec0c408ff2a8.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x00E30000
     Base size      = 45056

     MODULE NAME:     3f9a43419d60.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\3f9a43419d60.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x501D0000
     Base size      = 217088

     MODULE NAME:     d70c4587c2b0.tmp
     Executable     = C:\Users\ADMINI~1\AppData\Local\Temp\d70c4587c2b0.tmp
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x77C00000
     Base size      = 217088

     MODULE NAME:     SFC.DLL
     Executable     = C:\Windows\system32\SFC.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x5A590000
     Base size      = 12288

     MODULE NAME:     sfc_os.DLL
     Executable     = C:\Windows\system32\sfc_os.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x5A580000
     Base size      = 53248

     MODULE NAME:     Wintrust.dll
     Executable     = C:\Windows\syswow64\Wintrust.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x75840000
     Base size      = 184320

     MODULE NAME:     v3pro32s.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\v3pro32s.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x041B0000
     Base size      = 86016

     MODULE NAME:     asc_mmgr.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_mmgr.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x041D0000
     Base size      = 110592

     MODULE NAME:     asc_com.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_com.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04410000
     Base size      = 77824

     MODULE NAME:     gfs_base.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_base.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x02970000
     Base size      = 28672

     MODULE NAME:     gfs_util.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_util.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x041F0000
     Base size      = 28672

     MODULE NAME:     gfs_os.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_os.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04430000
     Base size      = 32768

     MODULE NAME:     gfs_mem.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_mem.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04440000
     Base size      = 28672

     MODULE NAME:     gfs_file.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_file.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04450000
     Base size      = 32768

     MODULE NAME:     asc_dh.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_dh.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04460000
     Base size      = 69632

     MODULE NAME:     fse_base.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_base.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04480000
     Base size      = 28672

     MODULE NAME:     fse_pe.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_pe.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04490000
     Base size      = 53248

     MODULE NAME:     gfs_proc.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_proc.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x044A0000
     Base size      = 28672

     MODULE NAME:     asc_unp.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_unp.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x044F0000
     Base size      = 360448

     MODULE NAME:     gfs_fact.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_fact.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x04590000
     Base size      = 24576

     MODULE NAME:     fse_fact.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_fact.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x045A0000
     Base size      = 24576

     MODULE NAME:     asc_fse.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_fse.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x047D0000
     Base size      = 24576

     MODULE NAME:     asc_intg.dll
     Executable     = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_intg.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x047E0000
     Base size      = 40960

     MODULE NAME:     CLBCatQ.DLL
     Executable     = C:\Windows\syswow64\CLBCatQ.DLL
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x753C0000
     Base size      = 536576

     MODULE NAME:     dxdiagn.dll
     Executable     = C:\Windows\SysWOW64\dxdiagn.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x77BC0000
     Base size      = 229376

     MODULE NAME:     dxgi.dll
     Executable     = C:\Windows\SysWOW64\dxgi.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0006
     Ref count (p)  = 0x0006
     Base address   = 0x77B30000
     Base size      = 536576

     MODULE NAME:     d3d10.dll
     Executable     = C:\Windows\SysWOW64\d3d10.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x77A20000
     Base size      = 1056768

     MODULE NAME:     d3d10core.dll
     Executable     = C:\Windows\SysWOW64\d3d10core.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x779E0000
     Base size      = 208896

     MODULE NAME:     d3d10_1.dll
     Executable     = C:\Windows\SysWOW64\d3d10_1.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x779B0000
     Base size      = 180224

     MODULE NAME:     d3d10_1core.dll
     Executable     = C:\Windows\SysWOW64\d3d10_1core.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x77970000
     Base size      = 237568

     MODULE NAME:     d3d11.dll
     Executable     = C:\Windows\SysWOW64\d3d11.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x778E0000
     Base size      = 536576

     MODULE NAME:     wbemprox.dll
     Executable     = C:\Windows\system32\wbem\wbemprox.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50120000
     Base size      = 40960

     MODULE NAME:     wbemcomn.dll
     Executable     = C:\Windows\system32\wbemcomn.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0002
     Ref count (p)  = 0x0002
     Base address   = 0x77880000
     Base size      = 376832

     MODULE NAME:     CRYPTSP.dll
     Executable     = C:\Windows\system32\CRYPTSP.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x73950000
     Base size      = 90112

     MODULE NAME:     rsaenh.dll
     Executable     = C:\Windows\system32\rsaenh.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x73910000
     Base size      = 241664

     MODULE NAME:     RpcRtRemote.dll
     Executable     = C:\Windows\system32\RpcRtRemote.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x712D0000
     Base size      = 57344

     MODULE NAME:     wbemsvc.dll
     Executable     = C:\Windows\system32\wbem\wbemsvc.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50010000
     Base size      = 61440

     MODULE NAME:     fastprox.dll
     Executable     = C:\Windows\system32\wbem\fastprox.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x777E0000
     Base size      = 614400

     MODULE NAME:     NTDSAPI.dll
     Executable     = C:\Windows\system32\NTDSAPI.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x777C0000
     Base size      = 98304

     MODULE NAME:     winbrand.dll
     Executable     = C:\Windows\system32\winbrand.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x50000000
     Base size      = 28672

     MODULE NAME:     atiumdag.dll
     Executable     = C:\Windows\system32\atiumdag.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0005
     Ref count (p)  = 0x0005
     Base address   = 0x5FF50000
     Base size      = 3117056

     MODULE NAME:     atiumdva.dll
     Executable     = C:\Windows\system32\atiumdva.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0005
     Ref count (p)  = 0x0005
     Base address   = 0x5FA70000
     Base size      = 5054464

     MODULE NAME:     DEVRTL.dll
     Executable     = C:\Windows\system32\DEVRTL.dll
     Process ID     = 0x000010A8
     Ref count (g)  = 0x0001
     Ref count (p)  = 0x0001
     Base address   = 0x713B0000
     Base size      = 57344

     THREAD ID      = 0x00001784
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000864
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00001708
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00001554
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000A9C
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000A64
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000488
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x000010DC
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00001548
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x000010EC
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x000017F4
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00001744
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x000005A8
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000A98
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x0000157C
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x00000E30
     Base priority  = 8
     Delta priority = 0

     THREAD ID      = 0x0000148C
     Base priority  = 8
     Delta priority = 0
0x01 is offline  
Old 06/09/2011, 07:16   #140
 
strik3r2k5's Avatar
 
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
Is zu viel arbeit...die adden einfach die dsound zu ihrem check und gut is..
strik3r2k5 is offline  
Old 06/09/2011, 12:46   #141
 
WestLotto's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
Wurde der Bot nun detected oder kann man da noch ne Woche mit "arbeiten"
WestLotto is offline  
Old 06/09/2011, 12:52   #142
 
EddyGER's Avatar
 
elite*gold: 0
Join Date: Nov 2008
Posts: 1,181
Received Thanks: 254
probier es doch einfach aus...was kann da schon großartig viel passieren ?
EddyGER is offline  
Old 06/09/2011, 13:44   #143
 
BoXxX's Avatar
 
elite*gold: 0
Join Date: Mar 2007
Posts: 1,860
Received Thanks: 882
Quote:
Originally Posted by WestLotto View Post
Wurde der Bot nun detected oder kann man da noch ne Woche mit "arbeiten"
ne inix hat noch keine botter dedactet, warschl alles blinde bei inix ;O die ganzen pfeile und mage attack die vom himmel kommen sind wohl sowass wie ne pest.. und die monster die einfach so umfallen (thief/knight) hatten wohl nen schwächeanfall..
aber glaube nich dass das botter waren

ok or no?
BoXxX is offline  
Thanks
2 Users
Old 06/09/2011, 14:05   #144
 
strik3r2k5's Avatar
 
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
ok
strik3r2k5 is offline  
Old 06/09/2011, 14:13   #145
 
DerKleineDarky's Avatar
 
elite*gold: 0
Join Date: May 2008
Posts: 682
Received Thanks: 208
ich sach doch es bleibt spannend, was für idioten lol
DerKleineDarky is offline  
Thanks
1 User
Old 06/09/2011, 14:27   #146
 
RunzelEier's Avatar
 
elite*gold: 0
Join Date: Dec 2010
Posts: 1,196
Received Thanks: 682
inix ist einfach nur übertrieben dumm....
es wäre so leicht die meisten bots zu fixen und was machen die? eierschaukeln.
die müssten am anfang ihrer sendfunktion nur eine neue variable definieren und alle leecher wären weg.

gibt es überhaupt noch leute die normal kal spielen?
war schon ewig nicht mehr auf dem int, aber das würde mich ja tierisch ankotzen
RunzelEier is offline  
Old 06/09/2011, 14:30   #147
 
WestLotto's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
Meine Eltern Lvl 72 Ohne bot Using
WestLotto is offline  
Old 06/09/2011, 15:03   #148
 
BoXxX's Avatar
 
elite*gold: 0
Join Date: Mar 2007
Posts: 1,860
Received Thanks: 882
Quote:
Originally Posted by WestLotto View Post
Meine Eltern Lvl 72 Ohne bot Using
hätte ja beinahe geschmunzelt
was machst du hier eigtl? geh wieder zurück in die metin section
BoXxX is offline  
Old 06/09/2011, 15:15   #149
 
WestLotto's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
Lol ? Ich spiele seit 2006 Kal o.0 Das mit metin war nur ne kurze Zeit.


Nur so btw. noob char mit bot using gerade eben geblockt
WestLotto is offline  
Old 06/09/2011, 15:29   #150
 
strik3r2k5's Avatar
 
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
läuft der bot auf der mit korreckter z coordinate?
strik3r2k5 is offline  
Closed Thread


Similar Threads Similar Threads
c9 classes
02/12/2010 - C9 - Continent of the Ninth - 0 Replies
Fighter http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_fighter.gif Hunter http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_hunter.gif Shaman http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_shaman.gif
[C#] need help - classes
01/11/2010 - .NET Languages - 19 Replies
Heyo x'd Well my main problem is my lazyness (oh yea, yea, yea), so I wanted to ask if there is any shortcut such as in Netbeans (Java, Shift+Ctrl+Insert or smthing) to automaticly generate Constructors, Set, Get methods. I kinda tried to google it but didn't find any shortcut. Maybe some of you can help me? Thank you.
3rd Classes
06/04/2008 - Ragnarok Online - 0 Replies
Für alle die es noch nicht mitbekommen haben: 3rd Classes - RO Future Wiki Ausserdem klingt dies hier sehr interessant, auch wenns nochnicht bestätigt wurde: Death Knight - RO Future Wiki und Dark Collector - RO Future Wiki
New Classes?
04/09/2007 - Conquer Online 2 - 12 Replies
hi, is co planning on new classes or is this old? somebody know this? i found this on C:\Program Files\Conquer 2.0\ini\ProfessionalName.ini (look at the big ones) 10,InternTrojan 11,Trojan 12,VeteranTrojan 13,TigerTrojan



All times are GMT +1. The time now is 04:47.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.