New scan:

Malware Scanner report for pctrojan.com

Malicious/Suspicious/Total urls checked
0/0/15
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Diginotar Hacked by Black.Spook and Iranian Hackers  (5 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.pctrojan.com/
200 OK
Content-Length: 24895
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Diginotar Hacked by Black.Spook and Iranian Hackers

...[11733 bytes skipped]...
href="http://www.f-secure.com/weblog/archives/00002223.html">Original article</a></li>
</ul> </div>

</div></div> <!-- /node-inner, /node -->

<div class="node " id="node-762"><div class="node-inner">
<h2 class="title">
<a href="/content/762-diginotar-hacked-blackspook-and-iranian-hackers">Diginotar Hacked by Black.Spook and Iranian Hackers</a>
</h2>



<div class="submitted">
Submitted by admin on Tue, 08/30/2011 - 16:12 </div>

<div class="taxonomy"> in <ul class="links inline"><li class="taxonomy_term_29 first last"><a href="/category/terms/twitter" rel="tag" title="">Twitter</a></li>
</ul></div>

<div class="content">
<p&g
...[18464 bytes skipped]...


http://www.pctrojan.com/misc/jquery.js?M
200 OK
Content-Length: 31028
Content-Type: application/javascript
clean
http://www.pctrojan.com/misc/drupal.js?M
200 OK
Content-Length: 9774
Content-Type: application/javascript
clean
http://www.pctrojan.com/sites/all/modules/google_analytics/googleanalytics.js?M
200 OK
Content-Length: 2268
Content-Type: application/javascript
clean
http://www.pctrojan.com/sites/all/themes/amity_island/js/jquery.pngFix.js?M
200 OK
Content-Length: 2742
Content-Type: application/javascript
clean
http://www.pctrojan.com/sites/all/themes/amity_island/js/suckerfish.js?M
200 OK
Content-Length: 395
Content-Type: application/javascript
clean
http://pagead2.googlesyndication.com/pagead/show_ads.js
200 OK
Content-Length: 19492
Content-Type: text/javascript
clean
http://www.pctrojan.com/content/70-about-us
200 OK
Content-Length: 8884
Content-Type: text/html
clean
http://www.pctrojan.com/contact
200 OK
Content-Length: 10162
Content-Type: text/html
clean
http://www.pctrojan.com/misc/textarea.js?M
200 OK
Content-Length: 1263
Content-Type: application/javascript
clean
http://www.pctrojan.com/category/all-terms/0day
200 OK
Content-Length: 28893
Content-Type: text/html
clean
http://www.pctrojan.com/content/764-how-we-found-file-was-used-hack-rsa
200 OK
Content-Length: 15487
Content-Type: text/html
clean
http://www.pctrojan.com/category/terms/antivirus
200 OK
Content-Length: 27724
Content-Type: text/html
clean
http://www.pctrojan.com/category/terms/twitter
200 OK
Content-Length: 26604
Content-Type: text/html
clean
http://www.pctrojan.com/content/762-diginotar-hacked-blackspook-and-iranian-hackers
200 OK
Content-Length: 13923
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: pctrojan.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: pctrojan.com
Referer: http://www.google.com/search?q=pctrojan.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=pctrojan.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://pctrojan.com/

Result: pctrojan.com is not infected or malware details are not published yet.