Unknown_html detected at MX Viruswatch archives.
Flagged once here: https://www.virustotal.com/nl/url/150e93b76c8f191d99a2dca8ec5bc9532e772f208b9e6c6544f71b34460f0198/analysis/1418310683/
Nothing detected here: https://www.metascan-online.com/en/scanresult/file/b7a12614257445178ca6bf5ee9f248ec
Suspicious file: fpsxqdzliof
Severity: Potentially Suspicious
Reason: Detected unconditional redirection to external web resource.
Details:
Threat dump: http://linkeddata.informatik.hu-berlin.de/uridbg/index.php?url=http%3A%2F%2Fwww.qualigo.de%2Fdoks%2Fsearch%2Fsource%2Fstd%2Fcharge_direct.php%3Fds%3Dsubdomzz%2526subds%3D000a.de%2526fallback_url%3Dhttp%253A%252F%252Fwww.000a.de&useragentheader=&acceptheader=
Threat dump MD5: 14618E2EBB6D467FDBBEBE1AFEC1BAFD
File size[byte]: 2265
File type: HTML
Page/File MD5: 262F25329D5260293326576F62E3ADA1
Scan duration[sec]: 0.006000
IP listed as PHISH: http://comments.gmane.org/gmane.comp.security.phishings/12667
wp_logout action hook is triggered - pay per click search service qualigo opposed to Overture and Google
Site with bad web rep: https://www.mywot.com/en/scorecard/khizar-waheed.000a.de?utm_source=addon&utm_content=warn-viewsc
polonus