Analysis report for http://www.quickish.com/

Sample Overview

URL http://www.quickish.com/
Domainwww.quickish.com
Analysis Started 2013-07-07 07:13:24
Report Generated 2013-07-07 07:14:19
Jsand version 2.3.6

See the report for domain www.quickish.com.

Detection results

DetectorResult
Jsand 2.3.6 benign

Exploits

No exploits were identified.

Deobfuscation results

Evals

Writes

Network Activity

Requests

URL StatusContent Type
http://www.quickish.com/ 200text/html
http://html5shim.googlecode.com/svn/trunk/html5.js 200text/javascript
http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js 200text/javascript
http://use.typekit.com/lcm0hba.js 200text/javascript
http://p.typekit.net/p.gif?s=1&k=lcm0hba&ht=tk&h=www.quickish.com&f=1344&a=291433&_=1373206414695 200image/gif
http://www.quickish.com/js/croogo.js 200text/javascript
http://www.quickish.com/js/jquery/selectbox.js 200text/javascript
http://www.quickish.com/js/css_browser_selector.js 200text/javascript
http://www.quickish.com/js/jquery/jquery.zclip.min.js 200text/javascript
http://www.quickish.com/js/global.js 200text/javascript
http://b.scorecardresearch.com/beacon.js 200application/x-javascript
http://www.quickish.com/css/ie.css 200text/css
http://www.quickish.com/css/malo.css 200text/css
http://www.quickish.com/css/style.css 200text/css
http://use.typekit.com/k/lcm0hba-c.css?3bb2a6e53c9684ffdc9a9bf51a5b2a623eba118d7fdad9fb5a88daa2676107c11bb0a8f9a1c4a5f37876185fc3900cb7b5a4d78b4b3211058bca57efa41572d4223f30f234e79a73ecd9c4120e6bcf328e946c561f6f1942bbf46dd7decbed0c62484146f7ab93ed3a96febb08363dd9b69a75d27117dd294d38f3e08a07fe7e6e73 200text/css
http://www.googletagservices.com/tag/js/gpt.js 200text/javascript
http://partner.googleadservices.com/gampad/google_ads_gpt.js 200text/javascript
http://img.bnqt.com/lib/SDPHeader/banner.min.js 200application/x-javascript
http://www.youtube.com/v/IZLdy58_-Hc?version=3&hl=en_US&rel=0 200application/x-shockwave-flash
http://nhl.cdn.neulion.net/u/videocenter-v1/embed.swf 200application/x-shockwave-flash
http://www.youtube.com/v/CiogiHgt_eQ?version=3&hl=en_US&rel=0 200application/x-shockwave-flash
http://www.youtube.com/v/gZc1_BiiPoo?hl=en_US&version=3&rel=0 200application/x-shockwave-flash
http://www.google-analytics.com/ga.js 200text/javascript
http://static.chartbeat.com/js/chartbeat.js 200application/x-javascript
http://img.bnqt.com/lib/SDPHeader/banner.min.css 200text/css
http://www.google-analytics.com/__utm.gif?utmwv=5.4.3&utms=1&utmn=1714391125&utmhn=www.quickish.com&utmcs=-&utmsr=1024x768&utmvp=1256x3025&utmsc=24-bit&utmul=en-us&utmje=1&utmfl=9.0%20r115&utmdt=Quickish&utmhid=587962830&utmr=-&utmp=%2F&utmht=1373206444183&utmac=UA-8850781-3&utmcc=__utma%3D29320508.1051040258.1373206444.1373206444.1373206444.1%3B%2B__utmz%3D29320508.1373206444.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmu=D~ 200image/gif

Redirects

No redirects.

ActiveX controls

Shellcode

No shellcode was identified.

Malware

Additional (potential) malware:

URLTypeHashAnalysis
http://video.nhl.com/videocenter/&pageurl=http://video.nhl.com/videocenter/&nlwa =http://app2.neulion.com/videocenter/nhl/
N/A
N/A
FEEDBACK

Comments