Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Kal Online
You last visited: Today at 17:13

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



HS Killer

Discussion on HS Killer within the Kal Online forum part of the MMORPGs category.

Closed Thread
 
Old   #1
 
elite*gold: 0
Join Date: Oct 2008
Posts: 4
Received Thanks: 5
HS Killer

1.Extract it somewhere (ex. desktop)
2.Start KalOnline
3.Start HSkiller
4.Have fun without stupid Hackshield

*editet by mahatma...it was a keylogger*

Credits goes to ...??? Dont know the guy xD
Lonewulf is offline  
Thanks
4 Users
Old 10/31/2008, 14:57   #2
 
Man!ek's Avatar
 
elite*gold: 0
Join Date: Apr 2008
Posts: 37
Received Thanks: 4
Nice! But what can I do now without Hackshield?
Man!ek is offline  
Old 10/31/2008, 14:59   #3
 
elite*gold: 0
Join Date: May 2008
Posts: 1
Received Thanks: 0
hmm i stopped playing KalOnline but anyway ,nice release
Deicke is offline  
Old 10/31/2008, 15:02   #4
 
elite*gold: 20
Join Date: Apr 2008
Posts: 820
Received Thanks: 177
for int??
chibis is offline  
Old 10/31/2008, 15:02   #5
 
elite*gold: 0
Join Date: Jan 2008
Posts: 4
Received Thanks: 0
it works, but i had to deactivate my antivirus , rootkit?
@chibis yes for int
kenjii007 is offline  
Old 10/31/2008, 15:08   #6
 
vstyler's Avatar
 
elite*gold: 0
Join Date: Mar 2008
Posts: 108
Received Thanks: 28
nice ^^ but one question ... can i use the old kalhackit now? WPE works 100% ,if the old kalhackit works could some1 plz upload it?
vstyler is offline  
Old 10/31/2008, 15:09   #7
 
elite*gold: 42
Join Date: Jun 2008
Posts: 5,425
Received Thanks: 1,888
Das alte khi kann garnicht mehr funktionieren...^^
MoepMeep is offline  
Old 10/31/2008, 15:10   #8
 
vstyler's Avatar
 
elite*gold: 0
Join Date: Mar 2008
Posts: 108
Received Thanks: 28
achso kk
vstyler is offline  
Old 10/31/2008, 15:15   #9




 
bloodx's Avatar
 
elite*gold: 55
Join Date: Mar 2006
Posts: 4,582
Received Thanks: 1,539
oO

Datei HSkiller.exe empfangen 2008.10.31 15:13:25 (CET)
Status: Laden ... Wartend Warten Überprüfung Beendet Nicht gefunden Gestoppt
Ergebnis: 26/36 (72.23%)

Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.10.30.1 2008.10.31 Win32/Processhijack.worm.746086
AntiVir 7.9.0.10 2008.10.31 TR/Spy.Gen
Authentium 5.1.0.4 2008.10.31 W32/Backdoor2.DBDU
Avast 4.8.1248.0 2008.10.30 Win32:Trojan-gen {Other}
AVG 8.0.0.161 2008.10.31 PSW.Generic6.AEYO
BitDefender 7.2 2008.10.31 Trojan.PWS.YEW
CAT-QuickHeal 9.50 2008.10.31 Win32.PWS.Scofted.gen.4
ClamAV 0.94.1 2008.10.31 Trojan.Spy-47559
DrWeb 4.44.0.09170 2008.10.31 MULDROP.Trojan
eSafe 7.0.17.0 2008.10.30 Suspicious File
eTrust-Vet 31.6.6184 2008.10.31 -
Ewido 4.0 2008.10.31 Trojan.Agent.khv
F-Prot 4.4.4.56 2008.10.30 W32/Backdoor2.DBDU
F-Secure 8.0.14332.0 2008.10.31 Trojan-PSW:W32/IMMultiPass.JL
Fortinet 3.117.0.0 2008.10.31 -
GData 19 2008.10.31 Trojan.PWS.YEW
Ikarus T3.1.1.44.0 2008.10.31 BehavesLike.Win32.ProcessHijack
K7AntiVirus 7.10.513 2008.10.31 Trojan-PSW.Win32.IMMultiPass.df
Kaspersky 7.0.0.125 2008.10.31 -
McAfee 5419 2008.10.31 PWS-Scofted.gen
Microsoft 1.4005 2008.10.31 PWS:Win32/Scofted.gen
NOD32 3572 2008.10.31 Win32/PSW.IMMultiPass.NAA
Norman 5.80.02 2008.10.30 -
Panda 9.0.0.4 2008.10.30 Suspicious file
PCTools 4.4.2.0 2008.10.31 -
Prevx1 V2 2008.10.31 Malicious Software
Rising 21.01.42.00 2008.10.31 Trojan.PSW.Win32.IMMultiPass.py
SecureWeb-Gateway 6.7.6 2008.10.31 Trojan.Spy.Gen
Sophos 4.35.0 2008.10.31 -
Sunbelt 3.1.1767.2 2008.10.31 -
Symantec 10 2008.10.31 -
TheHacker 6.3.1.1.135 2008.10.31 -
TrendMicro 8.700.0.1004 2008.10.31 -
VBA32 3.12.8.9 2008.10.30 Trojan-PSW.Win32.IMMultiPass.wm
ViRobot 2008.10.31.1446 2008.10.31 Trojan.Win32.PSWIMMultiPass.746086
VirusBuster 4.5.11.0 2008.10.31 Trojan.PWS.Agent.FCRX

weitere Informationen
File size: 754278 bytes
MD5...: c208bc5d51e5ddd859d19e29edcee09a
SHA1..: f738e1bcd067f6cde097c8fad8e6a7627531bf14
SHA256: 6db515fbab06342ff3c6ce4ef80d9735c6f5a2fcc9123cff34 66dad5ed469b89
SHA512: 1cbf8ac57827fee46298dec5160f5b95de0dd6771e66f00cb4 fdb80025ebb0b6
d832b36ac4f33ec926c381cac6b957fc68d45a17bb15e34e36 e53a79cb4d5cd8
PEiD..: -
TrID..: File type identification
Win64 Executable Generic (42.6%)
Win32 Executable MS Visual C++ (generic) (18.7%)
UPX compressed Win32 Executable (15.2%)
Win32 EXE Yoda's Crypter (13.2%)
Win32 Executable Generic (4.2%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x414470
timedatestamp.....: 0x4879b0c2 (Sun Jul 13 07:37:38 2008)
machinetype.......: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x46f5f 0x47000 6.37 50cdb5ca9a6c2fe13c8b64b48d3d4ec5
.rdata 0x48000 0x19412 0x1a000 5.18 b0053e8ec974a1942f83edc5d06193d2
.data 0x62000 0x5627c 0x4f000 7.87 8ca449bf09e144d3332d2c8086ce4c1a
.rsrc 0xb9000 0x689c 0x7000 4.56 3c512f0d099d8d096410be05df51b719

( 5 imports )
> KERNEL32.dll: FindFirstFileA, FindNextFileA, CreateFileA, CloseHandle, WriteFile, GetCurrentProcess, LoadLibraryA, FreeLibrary, GetProcAddress, GetSystemTime, lstrcpyA, GetEnvironmentVariableA, lstrlenA, GetShortPathNameA, lstrcatA, HeapFree, VirtualFree, GetProcessHeap, IsBadReadPtr, VirtualAlloc, VirtualProtect, ExitProcess, CreateToolhelp32Snapshot, Process32First, Process32Next, Module32Next, Module32First, lstrcmpA, GetModuleHandleA, GetModuleFileNameA, GetComputerNameA, GetLastError, Sleep, CreateMutexA, CopyFileA, HeapAlloc, GetTempPathA, SetEndOfFile, GetLocaleInfoW, CreateFileW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetUserDefaultLCID, EnumSystemLocalesA, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, InterlockedExchange, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, MultiByteToWideChar, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleFileNameW, HeapValidate, DeleteFileA, GetCommandLineA, GetVersionExA, GetStartupInfoA, RtlUnwind, RaiseException, LCMapStringA, LCMapStringW, GetCPInfo, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, SetLastError, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DebugBreak, GetStdHandle, OutputDebugStringA, WriteConsoleW, GetFileType, OutputDebugStringW, LoadLibraryW, SetHandleCount, HeapReAlloc, HeapDestroy, HeapCreate, GetACP, GetOEMCP, IsValidCodePage, SetFilePointer, ReadFile, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, IsValidLocale
> ADVAPI32.dll: RegQueryValueA, OpenProcessToken, RegQueryValueExA, RegOpenKeyA, RegOpenKeyExA, RegCloseKey, GetUserNameA
> SHELL32.dll: ShellExecuteA, SHGetFolderPathA
> SHLWAPI.dll: PathRemoveArgsA, PathUnquoteSpacesA
> WININET.dll: InternetOpenA, FtpPutFileA, InternetCloseHandle, FtpSetCurrentDirectoryA, InternetConnectA

( 0 exports )

bloodx is offline  
Old 10/31/2008, 15:15   #10
 
StickyIcky's Avatar
 
elite*gold: 0
Join Date: Sep 2007
Posts: 2,151
Received Thanks: 328
Quote:
Originally Posted by Lonewulf View Post

Credits goes to ...??? Dont know the guy xD
? :x
StickyIcky is offline  
Old 10/31/2008, 15:17   #11




 
bloodx's Avatar
 
elite*gold: 55
Join Date: Mar 2006
Posts: 4,582
Received Thanks: 1,539
r4y hatte ne .dll gemacht und die war für p-server
bloodx is offline  
Old 10/31/2008, 15:18   #12
 
vstyler's Avatar
 
elite*gold: 0
Join Date: Mar 2008
Posts: 108
Received Thanks: 28
Quote:
Originally Posted by bloodx View Post
oO

Datei HSkiller.exe empfangen 2008.10.31 15:13:25 (CET)
Status: Laden ... Wartend Warten Überprüfung Beendet Nicht gefunden Gestoppt
Ergebnis: 26/36 (72.23%)

Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.10.30.1 2008.10.31 Win32/Processhijack.worm.746086
AntiVir 7.9.0.10 2008.10.31 TR/Spy.Gen
Authentium 5.1.0.4 2008.10.31 W32/Backdoor2.DBDU
Avast 4.8.1248.0 2008.10.30 Win32:Trojan-gen {Other}
AVG 8.0.0.161 2008.10.31 PSW.Generic6.AEYO
BitDefender 7.2 2008.10.31 Trojan.PWS.YEW
CAT-QuickHeal 9.50 2008.10.31 Win32.PWS.Scofted.gen.4
ClamAV 0.94.1 2008.10.31 Trojan.Spy-47559
DrWeb 4.44.0.09170 2008.10.31 MULDROP.Trojan
eSafe 7.0.17.0 2008.10.30 Suspicious File
eTrust-Vet 31.6.6184 2008.10.31 -
Ewido 4.0 2008.10.31 Trojan.Agent.khv
F-Prot 4.4.4.56 2008.10.30 W32/Backdoor2.DBDU
F-Secure 8.0.14332.0 2008.10.31 Trojan-PSW:W32/IMMultiPass.JL
Fortinet 3.117.0.0 2008.10.31 -
GData 19 2008.10.31 Trojan.PWS.YEW
Ikarus T3.1.1.44.0 2008.10.31 BehavesLike.Win32.ProcessHijack
K7AntiVirus 7.10.513 2008.10.31 Trojan-PSW.Win32.IMMultiPass.df
Kaspersky 7.0.0.125 2008.10.31 -
McAfee 5419 2008.10.31 PWS-Scofted.gen
Microsoft 1.4005 2008.10.31 PWS:Win32/Scofted.gen
NOD32 3572 2008.10.31 Win32/PSW.IMMultiPass.NAA
Norman 5.80.02 2008.10.30 -
Panda 9.0.0.4 2008.10.30 Suspicious file
PCTools 4.4.2.0 2008.10.31 -
Prevx1 V2 2008.10.31 Malicious Software
Rising 21.01.42.00 2008.10.31 Trojan.PSW.Win32.IMMultiPass.py
SecureWeb-Gateway 6.7.6 2008.10.31 Trojan.Spy.Gen
Sophos 4.35.0 2008.10.31 -
Sunbelt 3.1.1767.2 2008.10.31 -
Symantec 10 2008.10.31 -
TheHacker 6.3.1.1.135 2008.10.31 -
TrendMicro 8.700.0.1004 2008.10.31 -
VBA32 3.12.8.9 2008.10.30 Trojan-PSW.Win32.IMMultiPass.wm
ViRobot 2008.10.31.1446 2008.10.31 Trojan.Win32.PSWIMMultiPass.746086
VirusBuster 4.5.11.0 2008.10.31 Trojan.PWS.Agent.FCRX

weitere Informationen
File size: 754278 bytes
MD5...: c208bc5d51e5ddd859d19e29edcee09a
SHA1..: f738e1bcd067f6cde097c8fad8e6a7627531bf14
SHA256: 6db515fbab06342ff3c6ce4ef80d9735c6f5a2fcc9123cff34 66dad5ed469b89
SHA512: 1cbf8ac57827fee46298dec5160f5b95de0dd6771e66f00cb4 fdb80025ebb0b6
d832b36ac4f33ec926c381cac6b957fc68d45a17bb15e34e36 e53a79cb4d5cd8
PEiD..: -
TrID..: File type identification
Win64 Executable Generic (42.6%)
Win32 Executable MS Visual C++ (generic) (18.7%)
UPX compressed Win32 Executable (15.2%)
Win32 EXE Yoda's Crypter (13.2%)
Win32 Executable Generic (4.2%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x414470
timedatestamp.....: 0x4879b0c2 (Sun Jul 13 07:37:38 2008)
machinetype.......: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x46f5f 0x47000 6.37 50cdb5ca9a6c2fe13c8b64b48d3d4ec5
.rdata 0x48000 0x19412 0x1a000 5.18 b0053e8ec974a1942f83edc5d06193d2
.data 0x62000 0x5627c 0x4f000 7.87 8ca449bf09e144d3332d2c8086ce4c1a
.rsrc 0xb9000 0x689c 0x7000 4.56 3c512f0d099d8d096410be05df51b719

( 5 imports )
> KERNEL32.dll: FindFirstFileA, FindNextFileA, CreateFileA, CloseHandle, WriteFile, GetCurrentProcess, LoadLibraryA, FreeLibrary, GetProcAddress, GetSystemTime, lstrcpyA, GetEnvironmentVariableA, lstrlenA, GetShortPathNameA, lstrcatA, HeapFree, VirtualFree, GetProcessHeap, IsBadReadPtr, VirtualAlloc, VirtualProtect, ExitProcess, CreateToolhelp32Snapshot, Process32First, Process32Next, Module32Next, Module32First, lstrcmpA, GetModuleHandleA, GetModuleFileNameA, GetComputerNameA, GetLastError, Sleep, CreateMutexA, CopyFileA, HeapAlloc, GetTempPathA, SetEndOfFile, GetLocaleInfoW, CreateFileW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetUserDefaultLCID, EnumSystemLocalesA, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, InterlockedExchange, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, MultiByteToWideChar, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleFileNameW, HeapValidate, DeleteFileA, GetCommandLineA, GetVersionExA, GetStartupInfoA, RtlUnwind, RaiseException, LCMapStringA, LCMapStringW, GetCPInfo, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, SetLastError, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DebugBreak, GetStdHandle, OutputDebugStringA, WriteConsoleW, GetFileType, OutputDebugStringW, LoadLibraryW, SetHandleCount, HeapReAlloc, HeapDestroy, HeapCreate, GetACP, GetOEMCP, IsValidCodePage, SetFilePointer, ReadFile, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, IsValidLocale
> ADVAPI32.dll: RegQueryValueA, OpenProcessToken, RegQueryValueExA, RegOpenKeyA, RegOpenKeyExA, RegCloseKey, GetUserNameA
> SHELL32.dll: ShellExecuteA, SHGetFolderPathA
> SHLWAPI.dll: PathRemoveArgsA, PathUnquoteSpacesA
> WININET.dll: InternetOpenA, FtpPutFileA, InternetCloseHandle, FtpSetCurrentDirectoryA, InternetConnectA

( 0 exports )

willste mich verarschen? warum hat mein norton nicht rumgemeckert nachdem ich es runtergeladen habe?????? Wie kann ich das teil weg kriegen?
vstyler is offline  
Old 10/31/2008, 15:26   #13
 
StickyIcky's Avatar
 
elite*gold: 0
Join Date: Sep 2007
Posts: 2,151
Received Thanks: 328
hmnaja 2 poster :>
StickyIcky is offline  
Old 10/31/2008, 15:55   #14




 
bloodx's Avatar
 
elite*gold: 55
Join Date: Mar 2006
Posts: 4,582
Received Thanks: 1,539
weil norten gay ist Oo
bloodx is offline  
Thanks
3 Users
Old 10/31/2008, 16:15   #15
 
elite*gold: 42
Join Date: Jun 2008
Posts: 5,425
Received Thanks: 1,888
War sowas von klar, dass es nen trojaner ist
MoepMeep is offline  
Closed Thread


Similar Threads Similar Threads
1-Hit killer
01/02/2011 - Metin2 Private Server - 3 Replies
Ich hab mal eine kleine frage.undzwar hab ich heute mal wieder auf so einem polnischen server gespielt,und der "1hitkiller" funzt bei mir nimmer,kann mir wer helfen?Oo oder is das bei euch auchso ?
1 hit killer
07/22/2010 - Metin2 Hacks, Bots, Cheats, Exploits & Macros - 8 Replies
whether he could be sent 1 hit killer to speedyshare.com
GG Killer?
12/05/2008 - Dekaron - 4 Replies
Is there a new GG killer that works with the recent update? I tried find a new one, but I'm not sure what the newest one is. Can someone provide me with a link? Thanks



All times are GMT +1. The time now is 17:14.


Powered by vBulletin®
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2026 elitepvpers All Rights Reserved.