What is at this site?

See: https://www.virustotal.com/nl/url/c37143eb7b2ba5e72467e0ad4453c8ce49f1d5b09e2fb745e73367a7037b8a40/analysis/1384539649/
potentially damaging content. → server redirect status: Code: 301, http://www.fondationruedibaer.ch/?ref=10
Redirect to external server!

Application: WordPress 3.6.1 - http://www.wordpress.org

Web application version:
WordPress version: WordPress 3.6.1
Wordpress version from source: 3.6.1
Wordpress Version 3.6.1 based on: htxp://www.fondationbaer.com//wp-admin/js/common.js
WordPress theme: htxp://www.fondationruedibaer.ch/wp-content/themes/charitas-child/
WordPress version outdated: Upgrade required.

No alerts here: http://urlquery.net/report.php?id=7731682
http://www.statscrop.com/www/fondationbaer.com

Quttera finds 1 suspicious file: index
Severity: Suspicious
Reason: Detected suspicious redirection to external web resources at HTTP level. [What’s this?]
Details: Detected HTTP redirection to htxp://www.fondationruedibaer.ch/?ref=10.
File size[byte]: 4294967295
File type: Unknown
MD5: 00000000000000000000000000000000
Scan duration[sec]: 0.001000
On this threat risk, read: http://quttera.com/article/how-to-fix-redirect

external script: http://jsunpack.jeek.org/?report=5871117a3b6f29f6a614e036c4f87ffcf5b0306a
→ can be fixed with diff: > $google_results =
$xml->children(’

Suspicious code hick-up: w\Xw.fondationruedibaer.ch/wp-content/themes/charitas-wpl/js/jquery.scrollParallax.min.js?ver=3.6.1 benign
[nothing detected] (script) wXw.fondationruedibaer.ch/wp-content/themes/charitas-wpl/js/jquery.scrollParallax.min.js?ver=3.6.1
status: (referer=wXw.fondationbaer.com/)saved 2380 bytes 026d72768d45cd143c191794337a631ec6b12dc0
info: [decodingLevel=0] found JavaScript
suspicious:

This scan is given a 99/100 malcious: http://zulu.zscaler.com/submission/show/6e7b0bc0367c8f4b2b29113c30173b1b-1384540669
e.g. http://jsunpack.jeek.org/?report=69a5d6ff07381dc26d95bd9d630dbe32c9d5be9f
and: failure: <urlopen error [Errno -2] Name or service not known>
http://jsunpack.jeek.org/?report=6ceda2edfaa38c5c6dbbc3bfb9d8ea5fea2301ee

polonus