|
You last visited: Today at 04:46
Advertisement
[Int] Bot for all Classes
Discussion on [Int] Bot for all Classes within the Kal Hacks, Bots, Cheats & Exploits forum part of the Kal Online category.
06/09/2011, 02:41
|
#136
|
elite*gold: 0
Join Date: Oct 2009
Posts: 26
Received Thanks: 1
|
so endlich main .. mal schaun ob was "gutes" bei rumkommt :>
|
|
|
06/09/2011, 03:10
|
#137
|
elite*gold: 0
Join Date: May 2008
Posts: 682
Received Thanks: 208
|
Quote:
Originally Posted by 0x01
so endlich main .. mal schaun ob was "gutes" bei rumkommt :>
|
naja die sollten eig genau wissen wie sie das fixen können, war ja von anfang an das ziel des releases ^^
naja aber da wir ja inixsoft kennen, bleibt es spannend
|
|
|
06/09/2011, 03:16
|
#138
|
elite*gold: 220
Join Date: Jun 2007
Posts: 3,768
Received Thanks: 1,126
|
dlsound.dll check -> skill
|
|
|
06/09/2011, 03:16
|
#139
|
elite*gold: 0
Join Date: Oct 2009
Posts: 26
Received Thanks: 1
|
da muss einiges gefixt werden
Code:
=====================================================
PROCESS NAME: engine.exe
-----------------------------------------------------
Process ID = 0x000010A8
Thread count = 17
Parent process ID = 0x00000874
Priority base = 8
Priority class = 32
MODULE NAME: engine.exe
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\engine.exe
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x00400000
Base size = 7356416
MODULE NAME: ntdll.dll
Executable = C:\Windows\SysWOW64\ntdll.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x77460000
Base size = 1572864
MODULE NAME: kernel32.dll
Executable = C:\Windows\syswow64\kernel32.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75ED0000
Base size = 1048576
MODULE NAME: KERNELBASE.dll
Executable = C:\Windows\syswow64\KERNELBASE.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x761C0000
Base size = 286720
MODULE NAME: USER32.dll
Executable = C:\Windows\syswow64\USER32.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x760C0000
Base size = 1048576
MODULE NAME: GDI32.dll
Executable = C:\Windows\syswow64\GDI32.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75970000
Base size = 589824
MODULE NAME: LPK.dll
Executable = C:\Windows\syswow64\LPK.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x77430000
Base size = 40960
MODULE NAME: USP10.dll
Executable = C:\Windows\syswow64\USP10.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x76210000
Base size = 643072
MODULE NAME: msvcrt.dll
Executable = C:\Windows\syswow64\msvcrt.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75590000
Base size = 704512
MODULE NAME: ADVAPI32.dll
Executable = C:\Windows\syswow64\ADVAPI32.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75880000
Base size = 655360
MODULE NAME: sechost.dll
Executable = C:\Windows\SysWOW64\sechost.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75570000
Base size = 102400
MODULE NAME: RPCRT4.dll
Executable = C:\Windows\syswow64\RPCRT4.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x75650000
Base size = 983040
MODULE NAME: SspiCli.dll
Executable = C:\Windows\syswow64\SspiCli.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x74FD0000
Base size = 393216
MODULE NAME: CRYPTBASE.dll
Executable = C:\Windows\syswow64\CRYPTBASE.dll
Process ID = 0x000010A8
Ref count (g) = 0xFFFF
Ref count (p) = 0xFFFF
Base address = 0x74FC0000
Base size = 49152
MODULE NAME: IMM32.DLL
Executable = C:\Windows\system32\IMM32.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0006
Ref count (p) = 0x0006
Base address = 0x75090000
Base size = 393216
MODULE NAME: MSCTF.dll
Executable = C:\Windows\syswow64\MSCTF.dll
Process ID = 0x000010A8
Ref count (g) = 0x0003
Ref count (p) = 0x0003
Base address = 0x75FD0000
Base size = 835584
MODULE NAME: uxtheme.dll
Executable = C:\Windows\system32\uxtheme.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x72A00000
Base size = 524288
MODULE NAME: HsSrv.dll
Executable = C:\Windows\SysWOW64\HsSrv.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x10000000
Base size = 217088
MODULE NAME: WINMM.dll
Executable = C:\Windows\SysWOW64\WINMM.dll
Process ID = 0x000010A8
Ref count (g) = 0x0009
Ref count (p) = 0x0009
Base address = 0x732E0000
Base size = 204800
MODULE NAME: DSOUND.dll
Executable = C:\Windows\SysWOW64\DSOUND.dll
Process ID = 0x000010A8
Ref count (g) = 0x0003
Ref count (p) = 0x0003
Base address = 0x72420000
Base size = 466944
MODULE NAME: ole32.dll
Executable = C:\Windows\syswow64\ole32.dll
Process ID = 0x000010A8
Ref count (g) = 0x001E
Ref count (p) = 0x001E
Base address = 0x762B0000
Base size = 1425408
MODULE NAME: POWRPROF.dll
Executable = C:\Windows\SysWOW64\POWRPROF.dll
Process ID = 0x000010A8
Ref count (g) = 0x0004
Ref count (p) = 0x0004
Base address = 0x73970000
Base size = 151552
MODULE NAME: SETUPAPI.dll
Executable = C:\Windows\syswow64\SETUPAPI.dll
Process ID = 0x000010A8
Ref count (g) = 0x0006
Ref count (p) = 0x0006
Base address = 0x751F0000
Base size = 1691648
MODULE NAME: CFGMGR32.dll
Executable = C:\Windows\syswow64\CFGMGR32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0017
Ref count (p) = 0x0017
Base address = 0x75390000
Base size = 159744
MODULE NAME: OLEAUT32.dll
Executable = C:\Windows\syswow64\OLEAUT32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0011
Ref count (p) = 0x0011
Base address = 0x75DD0000
Base size = 585728
MODULE NAME: DEVOBJ.dll
Executable = C:\Windows\syswow64\DEVOBJ.dll
Process ID = 0x000010A8
Ref count (g) = 0x0005
Ref count (p) = 0x0005
Base address = 0x760A0000
Base size = 73728
MODULE NAME: VERSION.dll
Executable = C:\Windows\SysWOW64\VERSION.dll
Process ID = 0x000010A8
Ref count (g) = 0x0008
Ref count (p) = 0x0008
Base address = 0x732D0000
Base size = 36864
MODULE NAME: dwmapi.dll
Executable = C:\Windows\system32\dwmapi.dll
Process ID = 0x000010A8
Ref count (g) = 0x0005
Ref count (p) = 0x0005
Base address = 0x72660000
Base size = 77824
MODULE NAME: COMCTL32.dll
Executable = C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7600.16385_none_ebf82fc36c758ad5\COMCTL32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0004
Ref count (p) = 0x0004
Base address = 0x75780000
Base size = 540672
MODULE NAME: comdlg32.dll
Executable = C:\Windows\syswow64\comdlg32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x75B50000
Base size = 503808
MODULE NAME: SHLWAPI.dll
Executable = C:\Windows\syswow64\SHLWAPI.dll
Process ID = 0x000010A8
Ref count (g) = 0x0009
Ref count (p) = 0x0009
Base address = 0x75030000
Base size = 356352
MODULE NAME: SHELL32.dll
Executable = C:\Windows\syswow64\SHELL32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0005
Ref count (p) = 0x0005
Base address = 0x76410000
Base size = 12881920
MODULE NAME: ws2_32.dll
Executable = C:\Windows\syswow64\ws2_32.dll
Process ID = 0x000010A8
Ref count (g) = 0x000A
Ref count (p) = 0x000A
Base address = 0x75740000
Base size = 217088
MODULE NAME: NSI.dll
Executable = C:\Windows\syswow64\NSI.dll
Process ID = 0x000010A8
Ref count (g) = 0x000E
Ref count (p) = 0x000E
Base address = 0x75640000
Base size = 24576
MODULE NAME: inetmib1.dll
Executable = C:\Windows\system32\inetmib1.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50210000
Base size = 61440
MODULE NAME: IPHLPAPI.DLL
Executable = C:\Windows\system32\IPHLPAPI.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x73A10000
Base size = 114688
MODULE NAME: WINNSI.DLL
Executable = C:\Windows\system32\WINNSI.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x73A00000
Base size = 28672
MODULE NAME: snmpapi.dll
Executable = C:\Windows\system32\snmpapi.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x502E0000
Base size = 36864
MODULE NAME: profapi.dll
Executable = C:\Windows\system32\profapi.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x73AB0000
Base size = 45056
MODULE NAME: dbghelp.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\dbghelp.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04CA0000
Base size = 856064
MODULE NAME: MSIMG32.dll
Executable = C:\Windows\system32\MSIMG32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x716B0000
Base size = 20480
MODULE NAME: d3dx9_29.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\d3dx9_29.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x05560000
Base size = 2433024
MODULE NAME: d3d9.dll
Executable = C:\Windows\system32\d3d9.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x606B0000
Base size = 1847296
MODULE NAME: d3d8thk.dll
Executable = C:\Windows\system32\d3d8thk.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x6B9E0000
Base size = 24576
MODULE NAME: EhSvc.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\EhSvc.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x05D50000
Base size = 5021696
MODULE NAME: imagehlp.dll
Executable = C:\Windows\syswow64\imagehlp.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x75810000
Base size = 172032
MODULE NAME: WININET.dll
Executable = C:\Windows\syswow64\WININET.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x750F0000
Base size = 999424
MODULE NAME: Normaliz.dll
Executable = C:\Windows\syswow64\Normaliz.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x75B40000
Base size = 12288
MODULE NAME: urlmon.dll
Executable = C:\Windows\syswow64\urlmon.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x75A00000
Base size = 1265664
MODULE NAME: CRYPT32.dll
Executable = C:\Windows\syswow64\CRYPT32.dll
Process ID = 0x000010A8
Ref count (g) = 0x0003
Ref count (p) = 0x0003
Base address = 0x75450000
Base size = 1163264
MODULE NAME: MSASN1.dll
Executable = C:\Windows\syswow64\MSASN1.dll
Process ID = 0x000010A8
Ref count (g) = 0x0004
Ref count (p) = 0x0004
Base address = 0x75870000
Base size = 49152
MODULE NAME: iertutil.dll
Executable = C:\Windows\syswow64\iertutil.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x75BD0000
Base size = 2068480
MODULE NAME: 362b2bd8bd38.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\362b2bd8bd38.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50070000
Base size = 286720
MODULE NAME: 31512de2c088.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\31512de2c088.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50020000
Base size = 286720
MODULE NAME: 97bb2f581928.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\97bb2f581928.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x77E20000
Base size = 1572864
MODULE NAME: psapi.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\psapi.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x00BA0000
Base size = 45056
MODULE NAME: 12453aee9290.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\12453aee9290.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x00E20000
Base size = 45056
MODULE NAME: ec0c408ff2a8.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\ec0c408ff2a8.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x00E30000
Base size = 45056
MODULE NAME: 3f9a43419d60.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\3f9a43419d60.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x501D0000
Base size = 217088
MODULE NAME: d70c4587c2b0.tmp
Executable = C:\Users\ADMINI~1\AppData\Local\Temp\d70c4587c2b0.tmp
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x77C00000
Base size = 217088
MODULE NAME: SFC.DLL
Executable = C:\Windows\system32\SFC.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x5A590000
Base size = 12288
MODULE NAME: sfc_os.DLL
Executable = C:\Windows\system32\sfc_os.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x5A580000
Base size = 53248
MODULE NAME: Wintrust.dll
Executable = C:\Windows\syswow64\Wintrust.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x75840000
Base size = 184320
MODULE NAME: v3pro32s.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\v3pro32s.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x041B0000
Base size = 86016
MODULE NAME: asc_mmgr.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_mmgr.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x041D0000
Base size = 110592
MODULE NAME: asc_com.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_com.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04410000
Base size = 77824
MODULE NAME: gfs_base.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_base.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x02970000
Base size = 28672
MODULE NAME: gfs_util.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_util.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x041F0000
Base size = 28672
MODULE NAME: gfs_os.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_os.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04430000
Base size = 32768
MODULE NAME: gfs_mem.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_mem.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04440000
Base size = 28672
MODULE NAME: gfs_file.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_file.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04450000
Base size = 32768
MODULE NAME: asc_dh.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_dh.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04460000
Base size = 69632
MODULE NAME: fse_base.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_base.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04480000
Base size = 28672
MODULE NAME: fse_pe.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_pe.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04490000
Base size = 53248
MODULE NAME: gfs_proc.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_proc.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x044A0000
Base size = 28672
MODULE NAME: asc_unp.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_unp.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x044F0000
Base size = 360448
MODULE NAME: gfs_fact.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\gfs_fact.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x04590000
Base size = 24576
MODULE NAME: fse_fact.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\fse_fact.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x045A0000
Base size = 24576
MODULE NAME: asc_fse.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_fse.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x047D0000
Base size = 24576
MODULE NAME: asc_intg.dll
Executable = D:\Games\KalOnline\Clients\International\KalOnlineEng\HShield\asc\asc_intg.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x047E0000
Base size = 40960
MODULE NAME: CLBCatQ.DLL
Executable = C:\Windows\syswow64\CLBCatQ.DLL
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x753C0000
Base size = 536576
MODULE NAME: dxdiagn.dll
Executable = C:\Windows\SysWOW64\dxdiagn.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x77BC0000
Base size = 229376
MODULE NAME: dxgi.dll
Executable = C:\Windows\SysWOW64\dxgi.dll
Process ID = 0x000010A8
Ref count (g) = 0x0006
Ref count (p) = 0x0006
Base address = 0x77B30000
Base size = 536576
MODULE NAME: d3d10.dll
Executable = C:\Windows\SysWOW64\d3d10.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x77A20000
Base size = 1056768
MODULE NAME: d3d10core.dll
Executable = C:\Windows\SysWOW64\d3d10core.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x779E0000
Base size = 208896
MODULE NAME: d3d10_1.dll
Executable = C:\Windows\SysWOW64\d3d10_1.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x779B0000
Base size = 180224
MODULE NAME: d3d10_1core.dll
Executable = C:\Windows\SysWOW64\d3d10_1core.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x77970000
Base size = 237568
MODULE NAME: d3d11.dll
Executable = C:\Windows\SysWOW64\d3d11.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x778E0000
Base size = 536576
MODULE NAME: wbemprox.dll
Executable = C:\Windows\system32\wbem\wbemprox.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50120000
Base size = 40960
MODULE NAME: wbemcomn.dll
Executable = C:\Windows\system32\wbemcomn.dll
Process ID = 0x000010A8
Ref count (g) = 0x0002
Ref count (p) = 0x0002
Base address = 0x77880000
Base size = 376832
MODULE NAME: CRYPTSP.dll
Executable = C:\Windows\system32\CRYPTSP.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x73950000
Base size = 90112
MODULE NAME: rsaenh.dll
Executable = C:\Windows\system32\rsaenh.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x73910000
Base size = 241664
MODULE NAME: RpcRtRemote.dll
Executable = C:\Windows\system32\RpcRtRemote.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x712D0000
Base size = 57344
MODULE NAME: wbemsvc.dll
Executable = C:\Windows\system32\wbem\wbemsvc.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50010000
Base size = 61440
MODULE NAME: fastprox.dll
Executable = C:\Windows\system32\wbem\fastprox.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x777E0000
Base size = 614400
MODULE NAME: NTDSAPI.dll
Executable = C:\Windows\system32\NTDSAPI.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x777C0000
Base size = 98304
MODULE NAME: winbrand.dll
Executable = C:\Windows\system32\winbrand.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x50000000
Base size = 28672
MODULE NAME: atiumdag.dll
Executable = C:\Windows\system32\atiumdag.dll
Process ID = 0x000010A8
Ref count (g) = 0x0005
Ref count (p) = 0x0005
Base address = 0x5FF50000
Base size = 3117056
MODULE NAME: atiumdva.dll
Executable = C:\Windows\system32\atiumdva.dll
Process ID = 0x000010A8
Ref count (g) = 0x0005
Ref count (p) = 0x0005
Base address = 0x5FA70000
Base size = 5054464
MODULE NAME: DEVRTL.dll
Executable = C:\Windows\system32\DEVRTL.dll
Process ID = 0x000010A8
Ref count (g) = 0x0001
Ref count (p) = 0x0001
Base address = 0x713B0000
Base size = 57344
THREAD ID = 0x00001784
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000864
Base priority = 8
Delta priority = 0
THREAD ID = 0x00001708
Base priority = 8
Delta priority = 0
THREAD ID = 0x00001554
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000A9C
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000A64
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000488
Base priority = 8
Delta priority = 0
THREAD ID = 0x000010DC
Base priority = 8
Delta priority = 0
THREAD ID = 0x00001548
Base priority = 8
Delta priority = 0
THREAD ID = 0x000010EC
Base priority = 8
Delta priority = 0
THREAD ID = 0x000017F4
Base priority = 8
Delta priority = 0
THREAD ID = 0x00001744
Base priority = 8
Delta priority = 0
THREAD ID = 0x000005A8
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000A98
Base priority = 8
Delta priority = 0
THREAD ID = 0x0000157C
Base priority = 8
Delta priority = 0
THREAD ID = 0x00000E30
Base priority = 8
Delta priority = 0
THREAD ID = 0x0000148C
Base priority = 8
Delta priority = 0
|
|
|
06/09/2011, 07:16
|
#140
|
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
|
Is zu viel arbeit...die adden einfach die dsound zu ihrem check und gut is..
|
|
|
06/09/2011, 12:46
|
#141
|
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
|
Wurde der Bot nun detected oder kann man da noch ne Woche mit "arbeiten"
|
|
|
06/09/2011, 12:52
|
#142
|
elite*gold: 0
Join Date: Nov 2008
Posts: 1,181
Received Thanks: 254
|
probier es doch einfach aus...was kann da schon großartig viel passieren ?
|
|
|
06/09/2011, 13:44
|
#143
|
elite*gold: 0
Join Date: Mar 2007
Posts: 1,860
Received Thanks: 882
|
Quote:
Originally Posted by WestLotto
Wurde der Bot nun detected oder kann man da noch ne Woche mit "arbeiten"
|
 ne inix hat noch keine botter dedactet, warschl alles blinde bei inix ;O die ganzen pfeile und mage attack die vom himmel kommen sind wohl sowass wie ne pest.. und die monster die einfach so umfallen (thief/knight) hatten wohl nen schwächeanfall..
aber glaube nich dass das botter waren
ok or no?
|
|
|
06/09/2011, 14:05
|
#144
|
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
|
ok
|
|
|
06/09/2011, 14:13
|
#145
|
elite*gold: 0
Join Date: May 2008
Posts: 682
Received Thanks: 208
|
ich sach doch es bleibt spannend, was für idioten lol
|
|
|
06/09/2011, 14:27
|
#146
|
elite*gold: 0
Join Date: Dec 2010
Posts: 1,196
Received Thanks: 682
|
inix ist einfach nur übertrieben dumm....
es wäre so leicht die meisten bots zu fixen und was machen die? eierschaukeln.
die müssten am anfang ihrer sendfunktion nur eine neue variable definieren und alle leecher wären weg.
gibt es überhaupt noch leute die normal kal spielen?
war schon ewig nicht mehr auf dem int, aber das würde mich ja tierisch ankotzen
|
|
|
06/09/2011, 14:30
|
#147
|
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
|
Meine Eltern  Lvl 72 Ohne bot Using
|
|
|
06/09/2011, 15:03
|
#148
|
elite*gold: 0
Join Date: Mar 2007
Posts: 1,860
Received Thanks: 882
|
Quote:
Originally Posted by WestLotto
Meine Eltern  Lvl 72 Ohne bot Using 
|
 hätte ja beinahe geschmunzelt
was machst du hier eigtl? geh wieder zurück in die metin section
|
|
|
06/09/2011, 15:15
|
#149
|
elite*gold: 0
Join Date: Dec 2007
Posts: 165
Received Thanks: 94
|
Lol ? Ich spiele seit 2006 Kal o.0 Das mit metin war nur ne kurze Zeit.
Nur so btw. noob char mit bot using gerade eben geblockt
|
|
|
06/09/2011, 15:29
|
#150
|
elite*gold: 0
Join Date: Jun 2006
Posts: 1,203
Received Thanks: 366
|
läuft der bot auf der mit korreckter z coordinate?
|
|
|
 |
|
Similar Threads
|
c9 classes
02/12/2010 - C9 - Continent of the Ninth - 0 Replies
Fighter
http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_fighter.gif
Hunter
http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_hunter.gif
Shaman
http://images.hangame.co.kr/hangame/c9/obt/sub/im g_job_shaman.gif
|
[C#] need help - classes
01/11/2010 - .NET Languages - 19 Replies
Heyo x'd
Well my main problem is my lazyness (oh yea, yea, yea), so I wanted to ask if there is any shortcut such as in Netbeans (Java, Shift+Ctrl+Insert or smthing) to automaticly generate Constructors, Set, Get methods. I kinda tried to google it but didn't find any shortcut.
Maybe some of you can help me?
Thank you.
|
3rd Classes
06/04/2008 - Ragnarok Online - 0 Replies
Für alle die es noch nicht mitbekommen haben:
3rd Classes - RO Future Wiki
Ausserdem klingt dies hier sehr interessant, auch wenns nochnicht bestätigt wurde:
Death Knight - RO Future Wiki
und
Dark Collector - RO Future Wiki
|
New Classes?
04/09/2007 - Conquer Online 2 - 12 Replies
hi,
is co planning on new classes or is this old? somebody know this?
i found this on C:\Program Files\Conquer 2.0\ini\ProfessionalName.ini
(look at the big ones)
10,InternTrojan
11,Trojan
12,VeteranTrojan
13,TigerTrojan
|
All times are GMT +1. The time now is 04:47.
|
|