======================================================== QH Malware Scanner v2.33 started 2020-06-23 01:31:13 UTC DB: 20180220 3 fd7b7dec01b7a3ca37743cee4b290c18 DRY RUN MODE. Malware will not be disabled. To disable them, run me with -d option ======================================================== WARNING: ./_current-files-before-repo/themes/therefinery/node_modules/node-sass/bin/linux-ia32-v8-3.14/binding.node is a unix binary file WARNING: ./_current-files-before-repo/themes/therefinery/node_modules/node-sass/bin/linux-x64-v8-3.14/binding.node is a unix binary file WARNING: ./_current-files-before-repo/themes/therefinery/node_modules/grunt/node_modules/iconv-lite/test/gbkFile.txt - #2250 A page with CHINESE Character set {charset=gb2312} PLEASE REVIEW WARNING: ./_current-files-before-repo/framework/thirdparty/simplepie/compatibility_test/sp_compatibility_test.php - #2367 Long Base64 encoded string {iVBORw0KGgoAAAANSUhEUgAAAZAAAAAtCAYAAACAnD3TAAAABH} PLEASE REVIEW WARNING: ./_current-files-before-repo/vendor/phpunit/php-token-stream/Tests/_files/issue30.php - #3320 Possible malware filename pattern PLEASE REVIEW WARNING: ./_current-files-before-repo/vendor/phpunit/php-token-stream/Tests/_files/issue19.php - #3320 Possible malware filename pattern PLEASE REVIEW WARNING: ./mbais.refinery2.com/themes/theme-ss-base/node_modules/jshint/bin/apply - #2210 Suspicious binary execution {.exec('curl} PLEASE REVIEW WARNING: ./mbais.refinery2.com/themes/theme-ss-base/node_modules/iconv-lite/test/gbkFile.txt - #2250 A page with CHINESE Character set {charset=gb2312} PLEASE REVIEW WARNING: ./mbais.refinery2.com/vendor/phpunit/php-token-stream/Tests/_files/issue30.php - #3320 Possible malware filename pattern PLEASE REVIEW WARNING: ./mbais.refinery2.com/vendor/phpunit/php-token-stream/Tests/_files/issue19.php - #3320 Possible malware filename pattern PLEASE REVIEW WARNING: ./therefinery.com.au/vendor/phpunit/phpunit-mock-objects/PHPUnit/Framework/MockObject/locale.php - #1590 Extracting input and variable function call (082) {extract($_POST); $p1(} PLEASE REVIEW WARNING: ./therefinery.com.au/vendor/phpunit/phpunit/PHPUnit/Framework/Constraint/embed.php - #1590 Extracting input and variable function call (082) {extract($_POST); $p1(} PLEASE REVIEW WARNING: ./therefinery.com.au/vendor/composer/installers/tests/Composer/Installers/Test/feed.php - #2110 Suspicious Code trying to cover its tracks {ini_set('log_errors', 0)} PLEASE REVIEW WARNING: ./therefinery.com.au/blog/js/jquery.php - #2367 Long Base64 encoded string {e57d7b7f1a47b2e8dfd2a7684d4806628400d9592f0824c796} PLEASE REVIEW WARNING: ./therefinery.refinery2.com/imagebanner/_resampled/PadWzEwMCwxMDAsIkZGRkZGRiIsMF0/FitWyIzMCIsIjQwIl0/animation_d21.gif - Not an image file PLEASE REVIEW WARNING: ./therefinery.refinery2.com/vendor/phpunit/phpunit-mock-objects/PHPUnit/Framework/MockObject/locale.php - #1590 Extracting input and variable function call (082) {extract($_POST); $p1(} PLEASE REVIEW WARNING: ./therefinery.refinery2.com/vendor/phpunit/phpunit/PHPUnit/Framework/Constraint/embed.php - #1590 Extracting input and variable function call (082) {extract($_POST); $p1(} PLEASE REVIEW WARNING: ./therefinery.refinery2.com/vendor/composer/installers/tests/Composer/Installers/Test/feed.php - #2110 Suspicious Code trying to cover its tracks {ini_set('log_errors', 0)} PLEASE REVIEW WARNING: ./therefinery.refinery2.com/blog/js/jquery.php - #2367 Long Base64 encoded string {e57d7b7f1a47b2e8dfd2a7684d4806628400d9592f0824c796} PLEASE REVIEW WARNING: ./dryrun.txt - #2210 Suspicious binary execution {.exec('curl} | #2250 A page with CHINESE Character set {charset=gb2312} PLEASE REVIEW ========================================================= SUMMARY: ========================================================= 110046 files were scanned 110009 files possibly clean 20 files were already disabled 1627 files larger than our threshold skipped 35 files generated WARNINGS 0 files were DISABLED 0 files were CLEANED from injections Scan time: 547.42 seconds