See: http://killmalware.com/nagoyajochi.net/#
11 files: Severity: Suspicious
Reason: Detected URL that was generated during page execution.
Details: Procedure [replace] has been called with a string containing hidden URL -‘filejo.com’
Javascript Check: Suspicious
ite;z-index:9998" ><iframe src=“” border=“0” id=“iframe01” name=“iframe01” width=“100%” height=“100%” style=“border:0;” scrolling=“no” styl
Included scripts: uspect - please check list for unknown includes
Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating1
document.write(“<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=
Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating2
document.write(”<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=
Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating3
document.write("<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=
Web application details:
Application: Textcube 1.8.6 : Accelerando
Outdated Web Server Apache Found: Apache/2.4.7
polonus