New scan:

Malware Scanner report for agentload.com

Malicious/Suspicious/Total urls checked
4/0/22
4 pages have malicious code. See details below
Blacklists
Found
The website is marked by Yandex as SMS-fraud resource.

The website "agentload.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=agentload.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://agentload.com/

Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://agentload.com/
200 OK
Content-Length: 65853
Content-Type: text/html
clean
http://agentload.com/js/jquery.min.js
200 OK
Content-Length: 93867
Content-Type: application/x-javascript
clean
http://agentload.com/js/default.js
200 OK
Content-Length: 2626
Content-Type: application/x-javascript
clean
http://agentload.com/sub_rules
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 13 Sep 2014 05:00:35 GMT
Location: http://agentload.com/sub_rules/
Server: nginx/1.2.3
Content-Length: 184
Content-Type: text/html
clean
http://agentload.com/sub_rules/
200 OK
Content-Length: 104427
Content-Type: text/html
clean
http://agentload.com/sub_control
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 13 Sep 2014 05:00:36 GMT
Location: http://agentload.com/sub_control/
Server: nginx/1.2.3
Content-Length: 184
Content-Type: text/html
clean
http://agentload.com/sub_control/
200 OK
Content-Length: 70625
Content-Type: text/html
clean
http://agentload.com/login/
200 OK
Content-Length: 65600
Content-Type: text/html
clean
http://agentload.com/?q=%3C%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D1%8F%3E+%D0%9C%D0%B8%D0%BD%D0%B7%D0%B4%D1%80%D0%B0%D0%B2%D0%B0+%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8+%D0%BE%D1%82+16.01.2013+%3C%D0%9E+%D1%80%D0%B5%D1%86%D0%B5%D0%BF%D1%82%D0%B0%D1%85+%D0%BD%D0%B0+%D0%BB%D0%B5%D0%BA%D0%B0%D1%80%D1%81%D1%82%D0%B2%D0%B5%D0%BD%D0%BD%D1%8B%D0%B5+%D0%BF%D1%80%D0%B5%D0%BF%D0%B0%D1%80%D0%B0%D1%82%D1%8B%3E&id=162854
200 OK
Content-Length: 101311
Content-Type: text/html
clean
http://agentload.com/download/?q=%D0%9C%D0%B8%D0%BD%D0%B7%D0%B4%D1%80%D0%B0%D0%B2%D0%B0+%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8+%D0%BE%D1%82+16.01.2013&id=162854
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sat, 13 Sep 2014 05:00:38 GMT
Pragma: no-cache
Location: /get_access/?query=%D0%9C%D0%B8%D0%BD%D0%B7%D0%B4%D1%80%D0%B0%D0%B2%D0%B0+%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8+%D0%BE%D1%82+16.01.2013&id=162854
Server: nginx/1.2.3
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=k7nGOzKn8atdSQgbQ5x3v2; expires=Sat, 13-Sep-2014 11:00:38 GMT; path=/
Set-Cookie: cook=ok; expires=Mon, 13-Oct-2014 05:00:38 GMT; path=/
Set-Cookie: country=LT; expires=Mon, 13-Oct-2014 05:00:38 GMT; path=/
Set-Cookie: _ft=1410595238; expires=Mon, 13-Oct-2014 05:00:38 GMT; path=/
X-Powered-By: PHP/5.4.6
clean
http://agentload.com/get_access/?query=%d0%9c%d0%b8%d0%bd%d0%b7%d0%b4%d1%80%d0%b0%d0%b2%d0%b0+%d0%a0%d0%be%d1%81%d1%81%d0%b8%d0%b8+%d0%be%d1%82+16.01.2013&id=162854
200 OK
Content-Length: 108294
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


$(document).ready(function() {
$('.number-accept').live('click', function() {
if ($(this).is(":checked")) {
$('.button-dl').removeClass('button-disabled');
} else {
$('.button-dl').addClass('button-disabled');
}
});

$('.sms-country').live('change', function() {
var country = $(this).val();
$(".sms-phone").text(data[country]['smsPhone']);
$(".sms-phone-adv").text(data[country]['smsPhoneAdv']);
$(".sms-cod
... 3604 bytes are skipped ...
}
if ($('.pseudo-accept').is(":visible")) {
if ($('.pseudo-accept').is(":checked")) {
} else {
$('.pseudo-form .error').text('Прежде чем получить доступ, вы должны согласиться с правилами.');
return false;
}
}
return true;
});
$('.pseudomc-rules-link').live('click', function(event) {
event.preventDefault();
$('.pseudomc-rules').show();
});

});

Antivirus reports:

DrWeb
JS.Loadpays.2

http://agentload.com/sub_rules?type=mts
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 13 Sep 2014 05:00:39 GMT
Location: http://agentload.com/sub_rules/?type=mts
Server: nginx/1.2.3
Content-Length: 184
Content-Type: text/html
clean
http://agentload.com/sub_rules/?type=mts
200 OK
Content-Length: 65710
Content-Type: text/html
clean
http://agentload.com/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%A4%D0%B8%D0%BD%D0%B0%D0%BD%D1%81%D0%BE%D0%B2%D0%BE%D0%BC+%D1%83%D0%BF%D0%BE%D0%BB%D0%BD%D0%BE%D0%BC%D0%BE%D1%87%D0%B5%D0%BD%D0%BD%D0%BE%D0%BC+%D0%BF%D0%BE+%D0%BF%D1%80%D0%B0%D0%B2%D0%B0%D0%BC+%D0%BF%D0%BE%D1%82%D1%8 <span>...221 symbols skipped</span>
200 OK
Content-Length: 94730
Content-Type: text/html
clean
http://agentload.com/download/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%A4%D0%B8%D0%BD%D0%B0%D0%BD%D1%81%D0%BE%D0%B2%D0%BE%D0%BC+%D1%83%D0%BF%D0%BE%D0%BB%D0%BD%D0%BE%D0%BC%D0%BE%D1%87%D0%B5%D0%BD%D0%BD%D0%BE%D0%BC+%D0%BF%D0%BE+%D0%BF%D1%80%D0%B0%D0%B2%D0%B0%D0%BC+%D0%BF%D0%BE%D <span>...230 symbols skipped</span>
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sat, 13 Sep 2014 05:00:40 GMT
Pragma: no-cache
Location: /get_access/?query=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%A4%D0%B8%D0%BD%D0%B0%D0%BD%D1%81%D0%BE%D0%B2%D0%BE%D0%BC+%D1%83%D0%BF%D0%BE%D0%BB%D0%BD%D0%BE%D0%BC%D0%BE%D1%87%D0%B5%D0%BD%D0%BD%D0%BE%D0%BC+%D0%BF%D0%BE+%D0%BF%D1%80%D0%B0%D0%B2%D0%B0%D0%BC+%D0%BF%D0%BE%D1%82%D1%80%D0%B5%D0%B1%D0%B8%D1%82%D0%B5%D0%BB%D0%B5%D0%B9+%D1%83%D1%81%D0%BB%D1%83%D0%B3+%D1%84%D0%B8%D0%BD%D0%B0%D0%BD%D1%81%D0%BE%D0%B2%D1%8B%D1%85+%D0%BE%D1%80%D0%B3%D0%B0%D0%BD%D0%B8%D0%B7%D0%B0%D1%86%D0%B8%D0%B9%22&id=162508
Server: nginx/1.2.3
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=wmdsw9L8UbudbEl3SZEWw1; expires=Sat, 13-Sep-2014 11:00:40 GMT; path=/
Set-Cookie: cook=ok; expires=Mon, 13-Oct-2014 05:00:40 GMT; path=/
Set-Cookie: country=LT; expires=Mon, 13-Oct-2014 05:00:40 GMT; path=/
Set-Cookie: _ft=1410595240; expires=Mon, 13-Oct-2014 05:00:40 GMT; path=/
X-Powered-By: PHP/5.4.6
clean
http://agentload.com/get_access/?query=%d0%9f%d1%80%d0%be%d0%b5%d0%ba%d1%82+%d0%a4%d0%b5%d0%b4%d0%b5%d1%80%d0%b0%d0%bb%d1%8c%d0%bd%d0%be%d0%b3%d0%be+%d0%b7%d0%b0%d0%ba%d0%be%d0%bd%d0%b0+%22%d0%9e+%d0%a4%d0%b8%d0%bd%d0%b0%d0%bd%d1%81%d0%be%d0%b2%d0%be%d0%bc+%d1%83%d0%bf%d0%be%d0%bb%d0%bd%d0%be%d0%bc%d0%be%d1%87%d0%b5%d0%bd%d0%bd%d0%be%d0%bc+%d0%bf%d0%be+%d0%bf%d1%80%d0%b0%d0%b2%d0%b0%d0%bc+%d0%bf%d <span>...236 symbols skipped</span>
200 OK
Content-Length: 115244
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


$(document).ready(function() {
$('.number-accept').live('click', function() {
if ($(this).is(":checked")) {
$('.button-dl').removeClass('button-disabled');
} else {
$('.button-dl').addClass('button-disabled');
}
});

$('.sms-country').live('change', function() {
var country = $(this).val();
$(".sms-phone").text(data[country]['smsPhone']);
$(".sms-phone-adv").text(data[country]['smsPhoneAdv']);
$(".sms-cod
... 3604 bytes are skipped ...
}
if ($('.pseudo-accept').is(":visible")) {
if ($('.pseudo-accept').is(":checked")) {
} else {
$('.pseudo-form .error').text('Прежде чем получить доступ, вы должны согласиться с правилами.');
return false;
}
}
return true;
});
$('.pseudomc-rules-link').live('click', function(event) {
event.preventDefault();
$('.pseudomc-rules').show();
});

});

Antivirus reports:

DrWeb
JS.Loadpays.2

http://agentload.com/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D0%BD%D0%B5%D0%BA%D0%BE%D1%82%D0%BE%D1%80%D1%8B%D0%B5+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%BE%D0%B4%D0%B0%D1%8 <span>...88 symbols skipped</span>
200 OK
Content-Length: 98560
Content-Type: text/html
clean
http://agentload.com/download/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D0%BD%D0%B5%D0%BA%D0%BE%D1%82%D0%BE%D1%80%D1%8B%D0%B5+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%BE%D0%B4%D <span>...97 symbols skipped</span>
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sat, 13 Sep 2014 05:00:42 GMT
Pragma: no-cache
Location: /get_access/?query=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D0%BD%D0%B5%D0%BA%D0%BE%D1%82%D0%BE%D1%80%D1%8B%D0%B5+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%BE%D0%B4%D0%B0%D1%82%D0%B5%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B0%D0%BA%D1%82%D1%8B+%D0%A0%D0%A4%22&id=163293
Server: nginx/1.2.3
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=daw3qTCDmerJb0MShNy4o3; expires=Sat, 13-Sep-2014 11:00:42 GMT; path=/
Set-Cookie: cook=ok; expires=Mon, 13-Oct-2014 05:00:42 GMT; path=/
Set-Cookie: country=LT; expires=Mon, 13-Oct-2014 05:00:42 GMT; path=/
Set-Cookie: _ft=1410595242; expires=Mon, 13-Oct-2014 05:00:42 GMT; path=/
X-Powered-By: PHP/5.4.6
clean
http://agentload.com/get_access/?query=%d0%9f%d1%80%d0%be%d0%b5%d0%ba%d1%82+%d0%a4%d0%b5%d0%b4%d0%b5%d1%80%d0%b0%d0%bb%d1%8c%d0%bd%d0%be%d0%b3%d0%be+%d0%b7%d0%b0%d0%ba%d0%be%d0%bd%d0%b0+%22%d0%9e+%d0%b2%d0%bd%d0%b5%d1%81%d0%b5%d0%bd%d0%b8%d0%b8+%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d0%b9+%d0%b2+%d0%bd%d0%b5%d0%ba%d0%be%d1%82%d0%be%d1%80%d1%8b%d0%b5+%d0%b7%d0%b0%d0%ba%d0%be%d0%bd%d0%be%d <span>...103 symbols skipped</span>
200 OK
Content-Length: 112094
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


$(document).ready(function() {
$('.number-accept').live('click', function() {
if ($(this).is(":checked")) {
$('.button-dl').removeClass('button-disabled');
} else {
$('.button-dl').addClass('button-disabled');
}
});

$('.sms-country').live('change', function() {
var country = $(this).val();
$(".sms-phone").text(data[country]['smsPhone']);
$(".sms-phone-adv").text(data[country]['smsPhoneAdv']);
$(".sms-cod
... 3604 bytes are skipped ...
}
if ($('.pseudo-accept').is(":visible")) {
if ($('.pseudo-accept').is(":checked")) {
} else {
$('.pseudo-form .error').text('Прежде чем получить доступ, вы должны согласиться с правилами.');
return false;
}
}
return true;
});
$('.pseudomc-rules-link').live('click', function(event) {
event.preventDefault();
$('.pseudomc-rules').show();
});

});

Antivirus reports:

DrWeb
JS.Loadpays.2

http://agentload.com/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D1%87%D0%B0%D1%81%D1%82%D0%B8+%D0%BF%D0%B5%D1%80%D0%B2%D1%83%D1%8E+%D0%B8+%D0%B2%D1%82%D0%BE%D1%80%D1%83%D1 <span>...292 symbols skipped</span>
200 OK
Content-Length: 92030
Content-Type: text/html
clean
http://agentload.com/download/?q=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D1%87%D0%B0%D1%81%D1%82%D0%B8+%D0%BF%D0%B5%D1%80%D0%B2%D1%83%D1%8E+%D0%B8+%D0%B2%D1%82%D0%BE%D1%80 <span>...301 symbols skipped</span>
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sat, 13 Sep 2014 05:00:43 GMT
Pragma: no-cache
Location: /get_access/?query=%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82+%D0%A4%D0%B5%D0%B4%D0%B5%D1%80%D0%B0%D0%BB%D1%8C%D0%BD%D0%BE%D0%B3%D0%BE+%D0%B7%D0%B0%D0%BA%D0%BE%D0%BD%D0%B0+%22%D0%9E+%D0%B2%D0%BD%D0%B5%D1%81%D0%B5%D0%BD%D0%B8%D0%B8+%D0%B8%D0%B7%D0%BC%D0%B5%D0%BD%D0%B5%D0%BD%D0%B8%D0%B9+%D0%B2+%D1%87%D0%B0%D1%81%D1%82%D0%B8+%D0%BF%D0%B5%D1%80%D0%B2%D1%83%D1%8E+%D0%B8+%D0%B2%D1%82%D0%BE%D1%80%D1%83%D1%8E+%D0%9D%D0%B0%D0%BB%D0%BE%D0%B3%D0%BE%D0%B2%D0%BE%D0%B3%D0%BE+%D0%BA%D0%BE%D0%B4%D0%B5%D0%BA%D1%81%D0%B0+%D0%A0%D0%A4+%D0%B8+%D0%97%D0%B0%D0%BA%D0%BE%D0%BD+%D0%A0%D0%A4+%22%D0%9E+%D1%82%D0%B0%D0%BC%D0%BE%D0%B6%D0%B5%D0%BD%D0%BD%D0%BE%D0%BC+%D1%82%D0%B0%D1%80%D0%B8%D1%84%D0%B5%22&id=162088
Server: nginx/1.2.3
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=Ac7kHL26myEWUHJycjZxR0; expires=Sat, 13-Sep-2014 11:00:43 GMT; path=/
Set-Cookie: cook=ok; expires=Mon, 13-Oct-2014 05:00:43 GMT; path=/
Set-Cookie: country=LT; expires=Mon, 13-Oct-2014 05:00:43 GMT; path=/
Set-Cookie: _ft=1410595243; expires=Mon, 13-Oct-2014 05:00:43 GMT; path=/
X-Powered-By: PHP/5.4.6
clean
http://agentload.com/get_access/?query=%d0%9f%d1%80%d0%be%d0%b5%d0%ba%d1%82+%d0%a4%d0%b5%d0%b4%d0%b5%d1%80%d0%b0%d0%bb%d1%8c%d0%bd%d0%be%d0%b3%d0%be+%d0%b7%d0%b0%d0%ba%d0%be%d0%bd%d0%b0+%22%d0%9e+%d0%b2%d0%bd%d0%b5%d1%81%d0%b5%d0%bd%d0%b8%d0%b8+%d0%b8%d0%b7%d0%bc%d0%b5%d0%bd%d0%b5%d0%bd%d0%b8%d0%b9+%d0%b2+%d1%87%d0%b0%d1%81%d1%82%d0%b8+%d0%bf%d0%b5%d1%80%d0%b2%d1%83%d1%8e+%d0%b8+%d0%b2%d1%82%d0%be <span>...307 symbols skipped</span>
200 OK
Content-Length: 112264
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


$(document).ready(function() {
$('.number-accept').live('click', function() {
if ($(this).is(":checked")) {
$('.button-dl').removeClass('button-disabled');
} else {
$('.button-dl').addClass('button-disabled');
}
});

$('.sms-country').live('change', function() {
var country = $(this).val();
$(".sms-phone").text(data[country]['smsPhone']);
$(".sms-phone-adv").text(data[country]['smsPhoneAdv']);
$(".sms-cod
... 3604 bytes are skipped ...
}
if ($('.pseudo-accept').is(":visible")) {
if ($('.pseudo-accept').is(":checked")) {
} else {
$('.pseudo-form .error').text('Прежде чем получить доступ, вы должны согласиться с правилами.');
return false;
}
}
return true;
});
$('.pseudomc-rules-link').live('click', function(event) {
event.preventDefault();
$('.pseudomc-rules').show();
});

});

Antivirus reports:

DrWeb
JS.Loadpays.2


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: agentload.com

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sat, 13 Sep 2014 05:00:34 GMT
Pragma: no-cache
Server: nginx/1.2.3
Vary: Accept-Encoding
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=1YWvgDkVFOpAQsLFYlEA71; expires=Sat, 13-Sep-2014 11:00:34 GMT; path=/
Set-Cookie: cook=ok; expires=Mon, 13-Oct-2014 05:00:34 GMT; path=/
Set-Cookie: country=LT; expires=Mon, 13-Oct-2014 05:00:34 GMT; path=/
Set-Cookie: _ft=1410595234; expires=Mon, 13-Oct-2014 05:00:34 GMT; path=/
X-Powered-By: PHP/5.4.6
Second query (visit from search engine):
GET / HTTP/1.1
Host: agentload.com
Referer: http://www.google.com/search?q=agentload.com

Result:
The result is similar to the first query. There are no suspicious redirects found.