javascript malware - SE visitors redirects Visitors from search engines.

See: http://killmalware.com/nagoyajochi.net/#
11 files: Severity: Suspicious
Reason: Detected URL that was generated during page execution.
Details: Procedure [replace] has been called with a string containing hidden URL -‘filejo.com
Javascript Check: Suspicious

ite;z-index:9998" ><iframe src=“” border=“0” id=“iframe01” name=“iframe01” width=“100%” height=“100%” style=“border:0;” scrolling=“no” styl

Included scripts: uspect - please check list for unknown includes

Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating1
document.write(“<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=
Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating2
document.write(”<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=
Suspicious Script:
htxp://sosa.semanticrep.com/spacead/ad_fixedad.js?scd=i2&mcd=floating3
document.write("<iframe marginheight=‘0’ marginwidth=‘0’ frameborder=‘0’ src='htxp://sosa.semanticrep.com/spacead/ad_fixedad.php?scd=i2&mcd=

Web application details:
Application: Textcube 1.8.6 : Accelerando
Outdated Web Server Apache Found: Apache/2.4.7

polonus