Javascript寫了一個清除“l(fā)ogo1_.exe”的殺毒工具(可掃描目錄)
更新時間:2007年02月09日 00:00:00 作者:
最近我的共享目錄里面所有exe文件都被病毒感染,上網(wǎng)一查才知道是“l(fā)ogo1_.exe”這個咚咚搞的鬼。網(wǎng)上對這個病毒的危害性評價得很高,認(rèn)為只要中了病毒,整臺機器都只能“Format”了。其原因大概就是因為所有應(yīng)用程序都被感染,運行任何程序都回使病毒“重生”。我使用“卡巴司機”殺毒,結(jié)果提示無法清除,將我整個exe文件給刪了。郁悶中,自己動手寫了這個咚咚來清除已感染程序里的的病毒。
中了“l(fā)ogo1_.exe”病毒請上網(wǎng)查找相關(guān)清除方法,本工具只是清除被感染文件里面的病毒,因沒有太多時間,沒做注冊表自動恢復(fù)功能;)
中毒的現(xiàn)象:會在所有含有exe文件的目錄下建立一個隱藏的“_desktop.ini”文件,里面記錄了病毒感染的日期。如果刪除該文件,病毒會重復(fù)感染已感染的應(yīng)用程序并重新生成“_desktop.ini”文件;很多被病毒感染的應(yīng)用程序會出現(xiàn)很模糊的ICO圖標(biāo)。
網(wǎng)上傳說該病毒每三分鐘活動一次哦,還說新裝的機器在帶毒的網(wǎng)絡(luò)工作,三分鐘之內(nèi)就會被遭毒手,裝新系統(tǒng)的朋友小心了。
為防止不小心的朋友運行病毒文件,我已經(jīng)將“.exe”后綴去掉了。大家可以添加“.exe”后綴名對比殺毒前和殺毒后的ICO圖標(biāo)變換情況。
再次提醒:未使用本工具清除“病毒樣本”里的病毒之前,千萬別運行“病毒樣本”程序。否則馬上中標(biāo) :D
保存為:Logo1_Kill.js運行即可
TaskKill("logo1_.exe");
TaskKill("rundl132.exe");
var window, lstKill, pnlScan, form1 = new Form;
form1.Run();
function Form()
{
var IE = WSH.GetObject("", "InternetExplorer.Application");
IE.ToolBar = 0;
IE.StatusBar = 0;
IE.Width = 350;
IE.Height = 360;
IE.Navigate("about:blank");
var document = IE.document;
document.body.scroll = "no";
document.body.style.font = "9pt 宋體";
window = document.frames;
document.body.charset = "gb2312";
document.bgColor = "menu";
document.body.style.border = 0;
document.title = "Logo1_.exe 病毒清除工具";
this.Run = function()
{
var btnKill = new Button("清除病毒");
var filebox = new FileBox;
var grpScan = new Group;
var grpKill = new Group("快速清除病毒");
var dirPath = new TextBox;
var btnScan = new Button("開始掃描");
pnlScan = new Panel;
lstKill = new ListBox;
dirPath.value = "D:\\";
grpScan.Text.data = "目錄掃描";
pnlScan.Text.data = "準(zhǔn)備就緒";
lstKill.style.width = "100%";
lstKill.style.height = "2in";
AddControl(grpKill);
grpKill.Add(filebox);
grpKill.Add(btnKill);
AddControl(grpScan);
grpScan.Add(dirPath);
grpScan.Add(btnScan);
grpScan.Add(pnlScan);
grpScan.Add(lstKill);
btnKill.onclick = btnKill_Clicked;
btnScan.onclick = btnScan_Clicked;
IE.Visible = true;
try
{
while(!window.closed)
{
if(btnScan.disabled)
{
try
{
var FSO = new ActiveXObject("Scripting.FileSystemObject");
var Folder = FSO.getFolder(dirPath.value);
FolderList(Folder);
}
catch(err)
{
window.alert(err.message);
}
btnScan.disabled = false;
window.alert("掃描完成。");
}
WSH.Sleep(1000);
}
}
catch(err)
{}
function btnKill_Clicked()
{
var FilePath = filebox.value;
if(FilePath && Check(FilePath))
{
if(window.confirm("發(fā)現(xiàn)病毒,是否清除?"))
{
try
{
Backup(FilePath);
}
catch(Err){}
while(Check(FilePath)) Clear(FilePath);
window.alert("清除了一個病毒。");
}
}
else
{
window.alert("未發(fā)現(xiàn)病毒。");
}
}
function btnScan_Clicked()
{
while(lstKill.options.length) lstKill.options.remove(0);
btnScan.disabled = true;
}
}
function AddControl(obj)
{
document.body.appendChild(obj);
}
function FileBox()
{
var obj = document.createElement("input");
obj.type = "file";
return obj;
}
function Button(text)
{
var obj = document.createElement("input");
obj.type = "button";
obj.value = text;
return obj;
}
function TextBox()
{
return document.createElement("input");
}
function Panel()
{
var Div = document.createElement("div");
Div.Add = function(Obj)
{
this.appendChild(Obj);
}
Div.Text = document.createTextNode();
Div.Add(Div.Text);
Div.style.overflow = "hidden";
return Div;
}
function Group(Title)
{
var fieldset = document.createElement("fieldset");
var legend = document.createElement("legend");
fieldset.Text = document.createTextNode();
fieldset.Text.data = Title;
legend.appendChild(fieldset.Text);
fieldset.Add = function(Obj)
{
this.appendChild(Obj);
}
fieldset.Add(legend);
fieldset.style.marginBottom = "2mm";
return fieldset;
}
function ListBox()
{
var select = document.createElement("select");
select.multiple = true;
select.Add = function(text)
{
var opt = window.Option(text);
select.options.add(opt);
}
return select;
}
}
function TaskKill(Process)
{
var WinMgmts = GetObject("WinMgmts://127.0.0.1");
var ProcList = WinMgmts.ExecQuery("select * from win32_process");
var ProcList = new Enumerator(ProcList);
while(!ProcList.atEnd())
{
if(ProcList.item().Name.toLowerCase() == Process.toLowerCase())
ProcList.item().terminate();
ProcList.moveNext();
}
}
function Check(SourcePath)
{
var Code = "MZKERNEL32.DLL\x00\x00LoadLibraryA\x00\x00\x00\x00GetProcAddress\x00\x00|\x00\x00BKwdwing@";
var Stream = new ActiveXObject("Adodb.Stream");
Stream.Open();
Stream.Charset = "gb2312";
Stream.LoadFromFile(SourcePath);
var Body = Stream.ReadText(60);
Stream.Close();
Body = Body.replace(/[\s\S]\x00\x00BK/, "|\x00\x00BK");
return Body == Code;
}
function Clear(SourcePath)
{
var Stream = new ActiveXObject("Adodb.Stream");
Stream.Open();
Stream.LoadFromFile(SourcePath);
var Body = Stream.ReadText(500 * 1024);
Stream.Close();
var Match = "";
while(Match.length < 21) Match += "\x00";
Match += "MZ";
var C = 0, Temp = "";
while(C< Body.length && Temp.indexOf(Match) <0)
{
var Uni = Body.substr(C, 1000);
C += 1000;
Temp += Decode(Uni);
}
var Position = Temp.indexOf(Match) + 21;
Stream.Type = 1;
Stream.Open();
Stream.LoadFromFile(SourcePath);
Stream.Position = Position;
Body = Stream.Read();
Stream.Position = 0;
Stream.SetEOS();
Stream.Write(Body);
Stream.SaveToFile(SourcePath, 2);
Stream.Close();
}
function Backup(SourcePath)
{
var FSO = new ActiveXObject("Scripting.FileSystemObject");
var File = FSO.GetFile(SourcePath);
File.Copy(SourcePath + ".logo1_vir", false);
}
function Decode(text)
{
return text.replace(/([\u0000-\uffff])/g, function($1)
{
var uni = $1.charCodeAt(0).toString(16);
while(uni.length < 4) uni = "0" + uni;
uni = uni.replace(/(\w{2})(\w{2})/g, "%$2%$1");
return unescape(uni);
});
}
function ScanFiles(Folder)
{
var Files = new Enumerator(Folder.Files);
while(!Files.atEnd())
{
if(Files.item().Name.slice(-4).toLowerCase() == ".exe")
{
var Path = Files.item().Path;
pnlScan.Text.data = Path;
if(Check(Path))
{
try
{
Backup(Path);
}
catch(err){}
while(Check(Path)) Clear(Path);
lstKill.Add(Path + " (OK)");
}
WSH.Sleep(50);
}
Files.moveNext();
}
}
function FolderList(Folder)
{
ScanFiles(Folder);
var Folders = new Enumerator(Folder.SubFolders);
WSH.Sleep(50);
while(!Folders.atEnd())
{
if(Folders.item().Path.match(/\\/g).length > 255) continue;
pnlScan.Text.data = Folders.item().Path + "\\";
FolderList(Folders.item());
Folders.moveNext();
}
}
中了“l(fā)ogo1_.exe”病毒請上網(wǎng)查找相關(guān)清除方法,本工具只是清除被感染文件里面的病毒,因沒有太多時間,沒做注冊表自動恢復(fù)功能;)
中毒的現(xiàn)象:會在所有含有exe文件的目錄下建立一個隱藏的“_desktop.ini”文件,里面記錄了病毒感染的日期。如果刪除該文件,病毒會重復(fù)感染已感染的應(yīng)用程序并重新生成“_desktop.ini”文件;很多被病毒感染的應(yīng)用程序會出現(xiàn)很模糊的ICO圖標(biāo)。
網(wǎng)上傳說該病毒每三分鐘活動一次哦,還說新裝的機器在帶毒的網(wǎng)絡(luò)工作,三分鐘之內(nèi)就會被遭毒手,裝新系統(tǒng)的朋友小心了。
為防止不小心的朋友運行病毒文件,我已經(jīng)將“.exe”后綴去掉了。大家可以添加“.exe”后綴名對比殺毒前和殺毒后的ICO圖標(biāo)變換情況。
再次提醒:未使用本工具清除“病毒樣本”里的病毒之前,千萬別運行“病毒樣本”程序。否則馬上中標(biāo) :D
保存為:Logo1_Kill.js運行即可
復(fù)制代碼 代碼如下:
TaskKill("logo1_.exe");
TaskKill("rundl132.exe");
var window, lstKill, pnlScan, form1 = new Form;
form1.Run();
function Form()
{
var IE = WSH.GetObject("", "InternetExplorer.Application");
IE.ToolBar = 0;
IE.StatusBar = 0;
IE.Width = 350;
IE.Height = 360;
IE.Navigate("about:blank");
var document = IE.document;
document.body.scroll = "no";
document.body.style.font = "9pt 宋體";
window = document.frames;
document.body.charset = "gb2312";
document.bgColor = "menu";
document.body.style.border = 0;
document.title = "Logo1_.exe 病毒清除工具";
this.Run = function()
{
var btnKill = new Button("清除病毒");
var filebox = new FileBox;
var grpScan = new Group;
var grpKill = new Group("快速清除病毒");
var dirPath = new TextBox;
var btnScan = new Button("開始掃描");
pnlScan = new Panel;
lstKill = new ListBox;
dirPath.value = "D:\\";
grpScan.Text.data = "目錄掃描";
pnlScan.Text.data = "準(zhǔn)備就緒";
lstKill.style.width = "100%";
lstKill.style.height = "2in";
AddControl(grpKill);
grpKill.Add(filebox);
grpKill.Add(btnKill);
AddControl(grpScan);
grpScan.Add(dirPath);
grpScan.Add(btnScan);
grpScan.Add(pnlScan);
grpScan.Add(lstKill);
btnKill.onclick = btnKill_Clicked;
btnScan.onclick = btnScan_Clicked;
IE.Visible = true;
try
{
while(!window.closed)
{
if(btnScan.disabled)
{
try
{
var FSO = new ActiveXObject("Scripting.FileSystemObject");
var Folder = FSO.getFolder(dirPath.value);
FolderList(Folder);
}
catch(err)
{
window.alert(err.message);
}
btnScan.disabled = false;
window.alert("掃描完成。");
}
WSH.Sleep(1000);
}
}
catch(err)
{}
function btnKill_Clicked()
{
var FilePath = filebox.value;
if(FilePath && Check(FilePath))
{
if(window.confirm("發(fā)現(xiàn)病毒,是否清除?"))
{
try
{
Backup(FilePath);
}
catch(Err){}
while(Check(FilePath)) Clear(FilePath);
window.alert("清除了一個病毒。");
}
}
else
{
window.alert("未發(fā)現(xiàn)病毒。");
}
}
function btnScan_Clicked()
{
while(lstKill.options.length) lstKill.options.remove(0);
btnScan.disabled = true;
}
}
function AddControl(obj)
{
document.body.appendChild(obj);
}
function FileBox()
{
var obj = document.createElement("input");
obj.type = "file";
return obj;
}
function Button(text)
{
var obj = document.createElement("input");
obj.type = "button";
obj.value = text;
return obj;
}
function TextBox()
{
return document.createElement("input");
}
function Panel()
{
var Div = document.createElement("div");
Div.Add = function(Obj)
{
this.appendChild(Obj);
}
Div.Text = document.createTextNode();
Div.Add(Div.Text);
Div.style.overflow = "hidden";
return Div;
}
function Group(Title)
{
var fieldset = document.createElement("fieldset");
var legend = document.createElement("legend");
fieldset.Text = document.createTextNode();
fieldset.Text.data = Title;
legend.appendChild(fieldset.Text);
fieldset.Add = function(Obj)
{
this.appendChild(Obj);
}
fieldset.Add(legend);
fieldset.style.marginBottom = "2mm";
return fieldset;
}
function ListBox()
{
var select = document.createElement("select");
select.multiple = true;
select.Add = function(text)
{
var opt = window.Option(text);
select.options.add(opt);
}
return select;
}
}
function TaskKill(Process)
{
var WinMgmts = GetObject("WinMgmts://127.0.0.1");
var ProcList = WinMgmts.ExecQuery("select * from win32_process");
var ProcList = new Enumerator(ProcList);
while(!ProcList.atEnd())
{
if(ProcList.item().Name.toLowerCase() == Process.toLowerCase())
ProcList.item().terminate();
ProcList.moveNext();
}
}
function Check(SourcePath)
{
var Code = "MZKERNEL32.DLL\x00\x00LoadLibraryA\x00\x00\x00\x00GetProcAddress\x00\x00|\x00\x00BKwdwing@";
var Stream = new ActiveXObject("Adodb.Stream");
Stream.Open();
Stream.Charset = "gb2312";
Stream.LoadFromFile(SourcePath);
var Body = Stream.ReadText(60);
Stream.Close();
Body = Body.replace(/[\s\S]\x00\x00BK/, "|\x00\x00BK");
return Body == Code;
}
function Clear(SourcePath)
{
var Stream = new ActiveXObject("Adodb.Stream");
Stream.Open();
Stream.LoadFromFile(SourcePath);
var Body = Stream.ReadText(500 * 1024);
Stream.Close();
var Match = "";
while(Match.length < 21) Match += "\x00";
Match += "MZ";
var C = 0, Temp = "";
while(C< Body.length && Temp.indexOf(Match) <0)
{
var Uni = Body.substr(C, 1000);
C += 1000;
Temp += Decode(Uni);
}
var Position = Temp.indexOf(Match) + 21;
Stream.Type = 1;
Stream.Open();
Stream.LoadFromFile(SourcePath);
Stream.Position = Position;
Body = Stream.Read();
Stream.Position = 0;
Stream.SetEOS();
Stream.Write(Body);
Stream.SaveToFile(SourcePath, 2);
Stream.Close();
}
function Backup(SourcePath)
{
var FSO = new ActiveXObject("Scripting.FileSystemObject");
var File = FSO.GetFile(SourcePath);
File.Copy(SourcePath + ".logo1_vir", false);
}
function Decode(text)
{
return text.replace(/([\u0000-\uffff])/g, function($1)
{
var uni = $1.charCodeAt(0).toString(16);
while(uni.length < 4) uni = "0" + uni;
uni = uni.replace(/(\w{2})(\w{2})/g, "%$2%$1");
return unescape(uni);
});
}
function ScanFiles(Folder)
{
var Files = new Enumerator(Folder.Files);
while(!Files.atEnd())
{
if(Files.item().Name.slice(-4).toLowerCase() == ".exe")
{
var Path = Files.item().Path;
pnlScan.Text.data = Path;
if(Check(Path))
{
try
{
Backup(Path);
}
catch(err){}
while(Check(Path)) Clear(Path);
lstKill.Add(Path + " (OK)");
}
WSH.Sleep(50);
}
Files.moveNext();
}
}
function FolderList(Folder)
{
ScanFiles(Folder);
var Folders = new Enumerator(Folder.SubFolders);
WSH.Sleep(50);
while(!Folders.atEnd())
{
if(Folders.item().Path.match(/\\/g).length > 255) continue;
pnlScan.Text.data = Folders.item().Path + "\\";
FolderList(Folders.item());
Folders.moveNext();
}
}
您可能感興趣的文章:
- JS調(diào)用安卓手機攝像頭掃描二維碼
- Node.JS中快速掃描端口并發(fā)現(xiàn)局域網(wǎng)內(nèi)的Web服務(wù)器地址(80)
- js微信掃描二維碼登錄網(wǎng)站技術(shù)原理
- JavaScript基礎(chǔ)之靜態(tài)方法和實例方法分析
- 基于JavaScript canvas繪制貝塞爾曲線
- JavaScript實現(xiàn)小球沿正弦曲線運動
- JavaScript模板引擎原理與用法詳解
- JavaScript基于數(shù)組實現(xiàn)的棧與隊列操作示例
- JavaScript實現(xiàn)的鼠標(biāo)跟隨特效示例【2則實例】
- 使用Sonarqube掃描Javascript代碼的示例
相關(guān)文章
純javascript前端實現(xiàn)base64圖片下載(兼容IE10+)
這篇文章主要介紹了純javascript前端實現(xiàn)base64圖片下載(兼容IE10+),小編覺得挺不錯的,現(xiàn)在分享給大家,也給大家做個參考。一起跟隨小編過來看看吧2018-09-09
vue(javaScript)操作字符串的一些常用方法總結(jié)
在平時前端開發(fā)中,我們不難發(fā)現(xiàn)經(jīng)常會用到字符串操作,這篇文章主要給大家介紹了關(guān)于vue(javaScript)操作字符串的一些常用方法的相關(guān)資料,需要的朋友可以參考下2024-01-01
JavaScript+HTML5實現(xiàn)的日期比較功能示例
這篇文章主要介紹了JavaScript+HTML5實現(xiàn)的日期比較功能,涉及javascript結(jié)合HTML5針對日期的轉(zhuǎn)換與運算相關(guān)操作技巧,需要的朋友可以參考下2017-07-07
ArrayBuffer Uint8Array Blob與文本字符相互轉(zhuǎn)換示例
這篇文章主要為大家介紹了ArrayBuffer Uint8Array Blob與文本字符相互轉(zhuǎn)換示例詳解,有需要的朋友可以借鑒參考下,希望能夠有所幫助,祝大家多多進(jìn)步,早日升職加薪2022-06-06
JavaScript中內(nèi)置函數(shù)Map()的使用
Map()是JavaScript中內(nèi)置的一種數(shù)據(jù)結(jié)構(gòu),它允許您將鍵值對映射到任意類型的值,主要介紹了JavaScript中內(nèi)置函數(shù)Map()的使用,感興趣的可以了解一下2023-05-05
70+漂亮且極具親和力的導(dǎo)航菜單設(shè)計國外網(wǎng)站推薦
網(wǎng)站可用性是任何網(wǎng)站的基本要素,而可用的導(dǎo)航更是網(wǎng)站所必需的要素之一。導(dǎo)航?jīng)Q定了用戶如何與網(wǎng)站進(jìn)行交互。如果沒有了可用的導(dǎo)航,那么網(wǎng)站內(nèi)容就會變得毫無用處。2011-09-09

