Site part of a malicious bot network....

Blocked by Sucuri E-set, see domain scan: https://www.virustotal.com/nl/domain/tamazawatokuichiro.com/information/
Joomla issues:
Joomla Modules, Components and Plugins
The following modules were detected from the HTML source of the Joomla front page.
No modules were found passively in HTML source
The following components were detected from the HTML source of the Joomla front page.
No components were found passively in HTML source
The following plugins were detected from the HTML source of the Joomla front page.
pdf_embed
Adding Modules, Components and Plugins to a Joomla site expands your attack surface. These addons are a source of many security vulnerabilities, it is important to always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes. Using the Joomscan scanner you are able to test more aggressively for plugins and modules installed within a Joomla installation.

IP risk: https://otx.alienvault.com/indicator/ip/209.54.52.223/

The malware: https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Ransom-BRP/detailed-analysis.aspx

See: http://urlquery.net/report.php?id=1449268842388
List of blacklisted external links: 28
List of referenced domains/hosts: 2
-www.google.co.jp
-ja.wikipedia.org

-http://tamazawatokuichiro.com
Detected libraries:
jquery-migrate - 1.2.1 : -http://tamazawatokuichiro.com/media/jui/js/jquery-migrate.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1) -http://tamazawatokuichiro.com/media/jui/js/jquery.min.js
(active) - the library was also found to be active by running code
1 vulnerable library detected

polonus