See: http://urlquery.net/report.php?id=80586
given as closed 2012-06-12 04:55:28
See: http://zulu.zscaler.com/submission/show/c988d3b1921744b2b7cc45839a4eeeda-1343404955
The location line in the header above has redirected the request to: htxp://www.quickerloanz.com/?ref=ed1
see: http://zulu.zscaler.com/submission/show/96d30302e51351accc70756fa940517d-1343405103
quickerloanz dot com/wp-includes/js/jquery/jquery.js benign
[nothing detected] (script) quickerloanz dot com/wp-includes/js/jquery/jquery.js
status: (referer=quickerloanz dot com/quickerloanz dot com)saved 93889 bytes caed7103070771ddb0bd97b2fc89d7429e20267c
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
suspicious: vulnerable to TrojanDownloader:JS/Adodb exploits,
polonus