Home > Software engineering >  VB meet rascal software hijacked IE home page being modified without permission.. Pray god to API
VB meet rascal software hijacked IE home page being modified without permission.. Pray god to API

Time:10-04

Rogue software hijacked IE homepage and using VB to do a thing about modification of the IE home page but found that change is not so open registry found the authority has been removed but permissions manually just nice and have changed the permissions by rogue software baidu along while also didn't find the result so I want to consult everybody a great god VB API on the registry permissions change whether SetEntriesInAcl
If it is please give a instance because I do not check it on baidu (thanks again) if not what is the function function again thank you very much, ladies and gentlemen

CodePudding user response:

Against rogue software, or install the larger 360 rogue software, eliminated all other rogue, unload 360 again, the whole world is clean no rogue software!

CodePudding user response:

reference 1st floor zhao4zhong1 response:
against rogue software, or install the larger 360 rogue software, eliminated all other rogue, unload 360 again, the whole world is clean no rogue software!

How to uninstall "360"? Less complex kill rogue software, here are a generic way (including "uninstall" 360) only need to find a common DOS startup disk, mostly integrates MHDD this tool, run it, erase command, knock again two enter, press y to done,

CodePudding user response:

Very thank you for your reply but what I mean is to use VB to do the work instead of anti-virus software,,

CodePudding user response:

Then you have to find you the rogue software, and then tell the VB, XXX. Exe is a rascal, get it! In this step,

CodePudding user response:

 VERSION 5.00 
The Begin VB. Form frmMain
BorderStyle=0 'None
ClientHeight=885
ClientLeft=0
ClientTop=0
ClientWidth=4680
LinkTopic="Form1"
ScaleHeight=885
ScaleWidth=4680
ShowInTaskbar=0 'False
StartUpPosition=3 'Windows default
End
The Attribute VB_Name="frmMain"
The Attribute VB_GlobalNameSpace=False
The Attribute VB_Creatable=False
The Attribute VB_PredeclaredId=True
The Attribute VB_Exposed=False
Option Explicit

'Private Const FOLDER_PATH="MACHINE \ SYSTEM \ CurrentControlSet \ Enum \ ACPI_HAL"
Private Const the SYNCHRONIZE As Long=& amp; H100000
Private Const STANDARD_RIGHTS_READ=& amp; H20000
Private Const STANDARD_RIGHTS_WRITE=& amp; H20000
Private Const STANDARD_RIGHTS_EXECUTE=& amp; H20000
Private Const STANDARD_RIGHTS_REQUIRED=& amp; HF0000
Private Const STANDARD_RIGHTS_ALL=& amp; H1F0000
Private Const KEY_QUERY_VALUE=https://bbs.csdn.net/topics/&H1
Private Const KEY_SET_VALUE=https://bbs.csdn.net/topics/&H2
Private Const KEY_CREATE_SUB_KEY=& amp; H4
Private Const KEY_ENUMERATE_SUB_KEYS=& amp; H8
Private Const KEY_NOTIFY=& amp; H10
Private Const KEY_CREATE_LINK=& amp; H20
Private Const KEY_READ=((STANDARD_RIGHTS_READ Or KEY_QUERY_VALUE Or KEY_ENUMERATE_SUB_KEYS Or KEY_NOTIFY) And (Not the SYNCHRONIZE))
Private Const KEY_WRITE=((STANDARD_RIGHTS_WRITE Or KEY_SET_VALUE Or KEY_CREATE_SUB_KEY) And (Not the SYNCHRONIZE))
Private Const KEY_EXECUTE=(KEY_READ)
Private Const KEY_ALL_ACCESS=((STANDARD_RIGHTS_ALL Or KEY_QUERY_VALUE Or KEY_SET_VALUE Or KEY_CREATE_SUB_KEY Or KEY_ENUMERATE_SUB_KEYS Or KEY_NOTIFY Or KEY_CREATE_LINK) And (Not the SYNCHRONIZE))
'Private Const STANDARD_RIGHTS_ALL As Long=& amp; H1F0000
Private Const ERROR_SUCCESS=0 & amp;
'Private Const READ_CONTROL=& amp; H20000
'Private Const KEY_QUERY_VALUE=https://bbs.csdn.net/topics/&H1
'Private Const KEY_SET_VALUE=https://bbs.csdn.net/topics/&H2
'Private Const KEY_CREATE_SUB_KEY=& amp; H4
'Private Const KEY_ENUMERATE_SUB_KEYS=& amp; H8
'Private Const KEY_NOTIFY=& amp; H10
'Private Const KEY_CREATE_LINK=& amp; H20
'Private Const KEY_ALL_ACCESS=((STANDARD_RIGHTS_ALL + KEY_QUERY_VALUE + KEY_SET_VALUE + KEY_NOTIFY KEY_ENUMERATE_SUB_KEYS KEY_CREATE_SUB_KEY + + + + READ_CONTROL KEY_CREATE_LINK) And (Not the SYNCHRONIZE))

Private Const DACL_SECURITY_INFORMATION=4 & amp;
Private Const SET_ACCESS=2 & amp;
Private Const SUB_CONTAINERS_AND_OBJECTS_INHERIT=& amp; H3

Private Enum SE_OBJECT_TYPE
SE_UNKNOWN_OBJECT_TYPE=0 & amp;
SE_FILE_OBJECT=1 & amp;
SE_SERVICE=2 & amp;
SE_PRINTER=3 & amp;
SE_REGISTRY_KEY=4 & amp;
SE_LMSHARE=5 & amp;
SE_KERNEL_OBJECT=6 & amp;
SE_WINDOW_OBJECT=7 & amp;
End Enum

'
Private Type TRUSTEE
PMultipleTrustee As Long
MultipleTrusteeOperation As Long
TrusteeForm As Long
TrusteeType As Long
PtstrName As String
End Type


Private Type EXPLICIT_ACCESS
GrfAccessPermissions As Long
GrfAccessMode As Long
GrfInheritance As Long
PTRUSTEE As TRUSTEE
End Type


Private Declare Sub BuildExplicitAccessWithName Lib "advapi32. DLL Alias" _
"BuildExplicitAccessWithNameA" _
(ea As Any, _
ByVal TrusteeName As String, _
ByVal AccessPermissions As Long, _
ByVal AccessMode As an Integer, _
ByVal Inheritance As Long)

Private Declare Function SetEntriesInAcl Lib "advapi32. DLL Alias" _
"SetEntriesInAclA" _
(ByVal CountofExplicitEntries As Long, _
Ea As Any, _
ByVal OldAcl As Long, _
NewAcl As Long As Long)

Private Declare Function GetNamedSecurityInfo Lib "advapi32. DLL Alias" _
nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull
  •  Tags:  
  • API
  • Related