Another one presented here with 44 instances of malcode: http://urlquery.net/report.php?id=1490787142698
Quttera’s flags this as potentially suspicious script: /wp-content/themes/hq/js/main.js?ver=4.1.16
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.

Details: Too low entropy detected in string [['.moveFromLeft, .moveFromRight, .moveFromTop, .moveFromBottom, .fadeIn, .fadeFromLeft, .fadeFromRight']] of length 131 which may point to obfuscation or shellcode.
(script) platform.twitter.com/widgets.js status: (referer=-http:/www.ask.com/web?q=puppies)saved 115585 bytes d0b4f241d1c4285709d032b3ee3ea65de5883ace info: [decodingLevel=0] found JavaScript suspicious: maxruntime exceeded 10 seconds (incomplete) 0 bytes file: d0b4f241d1c4285709d032b3ee3ea65de5883ace: 115585 bytes file: 2c07d11cd0c3af6b6b6a6c0966763b1d55bddb58: 115801 bytes file: 0678b7d40071ba155fcc76185527985890fecea2: 115807 bytes file: f10cd9aa9acadb31e5f14e0d8a2e25f818105009: 116016 bytes file: 08f98498bbe46e337ecf40f24e7ff3aa31651da6: 116208 bytes file: 88322cf42e4f3fcd3ace00dfd6770d0a4b213e45: 115922 bytes file: 50f6341066895f249d4ede982dba5114d79a7b57: 116046 bytes

Threat dump MD5: 2200EA0B37F930CC4BB32B8AB23ABCD1
File size[byte]: 197271
File type: ASCII
Page/File MD5: EED27F57F2B663657929E57568E3177F
Scan duration[sec]: 22.701000 → http://www.domxssscanner.com/scan?url=http%3A%2F%2Ftethysresorts.com

WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress under 4.7.3 Word-Press self-hosted → http://toolbar.netcraft.com/site_report?url=+tethysresorts.com

3 jQuery libararies to be retired: http://retire.insecurity.today/#!/scan/c60dca7896fd64e178eee977174e7ae13a2e69456580e39ba3242b84210b8fcd

C-status 5 issues: https://sritest.io/#report/59114b92-9f4f-40a1-964d-4120aad7b953

F-status: https://observatory.mozilla.org/analyze.html?host=tethysresorts.com

polonus (volunteer website security analyst and website error-hunter)