Scanned adn only deteted via BitDefender: https://www.virustotal.com/nl/url/3ee6bfe304e8a2a6f8d1399722f0b70f928598dc7652e90684b84c7a0dae8b4a/analysis/1406210468/
Full detection by Sucuri’s: ISSUE DETECTED DEFINITION INFECTED URL
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/ ( View Payload )
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/404testpage4525d2fdc ( View Payload )
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/404javascript.js ( View Payload )
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/874/ ( View Payload )
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/453/ ( View Payload )
Website Malware malware-entry-mwjsanon7?v11 htxp://772.whsy2.wmb140.com/404/ ( View Payload )
Known javascript malware. Details: http://labs.sucuri.net/db/malware/malware-entry-mwjsanon7?v11
</html><script>window._bd_share_config={"common":{"bdSnsKey":{},"bdText":"","bdMini":"2","bdMiniList":false,"bdPic":"","bdStyle":"0","bdSize":"16"},"slide":{"type":"slide","bdImg":"6","bdPos":"right","bdTop":"100"},"image":{"viewList":["qzone","tsina","tqq","renren","weixin"],"viewText":"��������","viewSize":"16"},"selectShare":{"bdContainerClass":null,"bdSelectMiniList":["qzone","tsina","tqq","renren","weixin"]}};with(document)0[(getElementsByTagName('head')[0]||body).appendChild(createElement('script')).src='htxp://bdimg.share.baidu.com/static/api/js/share.js?v=89860593.js?cdnversion='+~(-new Date()/36e5)];</script
Security issues detected via this scan: https://asafaweb.com/Scan?Url=772.whsy2.wmb140.com
Excessive header info: Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET, PHP/5.2.17
X-AspNet-Version: 1.1.4322
Blacklisted and malware detected: http://www.urlquery.net/report.php?id=1406097458162 from Host: js.users.51 dot la
polonus