查看: 3932|回复: 17
收起左侧

[已鉴定] 江西财大成教学院

 关闭 [复制链接]
mr_zhj
发表于 2008-12-13 14:39:10 | 显示全部楼层 |阅读模式
http://cjxy.jxufe.cn/

费尔报木马
残缺的唯美
发表于 2008-12-13 14:42:45 | 显示全部楼层
Malicious Web Site Blocked

You attempted to access:

​http:​//cjx​y.jxu​fe.cn​/

This is a known mailicious web site. It is recommended that you do NOT visit this site. The detailed report explains the security risks on this site.

For your protection, this web site has been blocked. Visit Symantec to learn more about phishing and internet security.
tanlimo
发表于 2008-12-13 14:42:47 | 显示全部楼层
Log is generated by FreShow.
[wide]http://cjxy.jxufe.cn/
    [script]http://conn.lachezvos.com/click.js?bgcr=ffffff&urlcr=0000ff&tbsz=260&sropls=1
        [frame]http://www.rxgsslll.cn/yhyw/2.htm
            [frame]http://wm.sllwrnm8.cn/a10/fxx.htm
                [frame]http://wm.sllwrnm8.cn/a10/fx.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/ss.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/MS06014.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/sina.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/UU.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/Thunder.html
                [frame]http://wm.sllwrnm8.cn/a10/../a1/GLWORLD.html
                [frame]http://wm.sllwrnm8.cn/a10/../a1/real.htm
                [frame]http://wm.sllwrnm8.cn/a10/../a1/Real.html


http://down.erhaha2.cn/new/a1.css
http://down.hs7yue.cn/down/ko.css

[ 本帖最后由 tanlimo 于 2008-12-13 14:43 编辑 ]
电影结束了
发表于 2008-12-13 14:42:53 | 显示全部楼层
残缺的唯美
发表于 2008-12-13 14:43:59 | 显示全部楼层
Total threats found: 888

Small-whitebg-red         Drive-By Downloads (what's this?)

Threats found: 663
Here is a sample:
Threat Name:         Downloader
Signature (MD5):         8599a389d7cb7aae4ea7f9a6cd3aac09
Location:         http://stuaff.jxufe.cn/xgb/bigcl ... 6&bigclassid=71

       
Threat Name:         Downloader
Signature (MD5):         8599a389d7cb7aae4ea7f9a6cd3aac09
Location:         http://stuaff.jxufe.cn/xgb/type.asp?typeID=16

       
Threat Name:         Downloader
Signature (MD5):         8599a389d7cb7aae4ea7f9a6cd3aac09
Location:         http://stuaff.jxufe.cn/xgb/bigcl ... 4&bigclassid=20

       
Threat Name:         Processes Started
Location:         http://art.jxufe.cn/informations/selfupdata.asp

       
Threat Name:         Processes Started
Location:         http://art.jxufe.cn/news/more.as ... 0%C3%82%C3%8E%C3%85

       
Direct link to:
Location:         http://www.finance.jxufe.cn/student/Softdown.asp

       
Direct link to:
Location:         http://stuaff.jxufe.cn/

       
Direct link to:
Location:         http://art.jxufe.cn/

       
Direct link to:
Location:         http://stuaff.jxufe.cn/xgb/Index.Asp

       
Direct link to:
Location:         http://www.finance.jxufe.cn/class/03_4/index.htm

       
Small-whitebg-red         Viruses (what's this?)

Threats found: 225
Here is a sample:
Direct link to:
Location:         http://www.finance.jxufe.cn/student/index.asp

       
Direct link to:
Location:         http://www.finance.jxufe.cn/class/03_2/index.htm

       
Direct link to:
Location:         http://www.finance.jxufe.cn/class/05_2/index.htm

       
Direct link to:
Location:         http://www.finance.jxufe.cn/class/04_2/index.htm

       
Direct link to:
Location:         http://www.finance.jxufe.cn/stud ... .asp?ArticleID=1523

       
Direct link to:
Location:         http://www.finance.jxufe.cn/student/Photo_Class.asp?ClassID=2

       
Direct link to:
Location:         http://www.finance.jxufe.cn/class/bbs/

       
Direct link to:
Location:         http://www.finance.jxufe.cn/student/Index.asp

       
Direct link to:
Location:         http://finance.jxufe.cn/

       
Direct link to:
Location:         http://www.finance.jxufe.cn/english/index.html
syfwxmh
发表于 2008-12-13 14:45:33 | 显示全部楼层

回复 4楼 电影结束了 的帖子

卡巴KSN阻止

该文件TO KL
syfwxmh
发表于 2008-12-13 14:52:55 | 显示全部楼层
Hello.

This file is already detected. Please update your bases.
Trojan-Dropper.Win32.Agent.abku

>
>
> ------------------
> The Russia Kaspersky Lab Board Of the Honor Members
>
> Users ID:syfwxmh
>
Regards, Tatarinov Ivan
Virus Analyst
08红伞威点
发表于 2008-12-13 15:05:51 | 显示全部楼层
红伞进去捉了4个出来。

打包上传 文件x4.rar (4.76 KB, 下载次数: 33)
08红伞威点
发表于 2008-12-13 15:09:41 | 显示全部楼层
Start of the scan: 2008年12月13日  15:07

Starting the file scan:

Begin scan in 'C:\Documents and Settings\***\桌面\文件x4.rar'
C:\Documents and Settings\***\桌面\文件x4.rar
    [0] Archive type: RAR
发表帖    --> ᅫᅣᄐ?x4\css[1].js
      [DETECTION] Contains recognition pattern of the JS/Iframe.W.55 Java script virus
子[完成后可按    --> ᅫᅣᄐ?x4\fxx[1].htm
      [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.HZ Java script virus
Ctrl+En    --> ᅫᅣᄐ?x4\fx[1].htm
      [DETECTION] Contains recognition pattern of the HTML/Agent.655 HTML script virus
ter 发布]     --> ᅫᅣᄐ?x4\ss[1].htm
      [DETECTION] Contains recognition pattern of the JS/Agent.bct Java script virus
    [NOTE]      A backup was created as '49bbae29.qua'  ( QUARANTINE )
    [NOTE]      The file was deleted!
killloop
发表于 2008-12-13 15:28:09 | 显示全部楼层
Bloodhound.EXPLOIT.219
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-12-17 06:44 , Processed in 0.152354 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表