Again you have been protected by avast av,
See: htxps://www.virustotal.com/file/ca9d453a69255e2e55a6ef58153bd24e1d29dce34dc5a041a768973787262635/analysis/
for malware found here: htxp://zulu.zscaler.com/submission/show/70566067cdc807d441526d988f6e5739-1336321903 (not detected there)
See: htxp://urlquery.net/report.php?id=51381 (IDS Suricata /w Emerging Threats No alerts detected)
See: htxp://minotauranalysis.com/search.aspx?q=3cc539bce7cef274d751cf08d6b0a9bb
given as
HTML:Framer-inf [Trj]
JS/IFrame!exploit
HTML:Framer-inf
polonus
Hi Polonus,
http://zulu.zscaler.com/submission/show/d993321df13237a22393b65a56dac2f7-1336331045
http://urlquery.net/report.php?id=51403
I do see the frame making javascript, however, I do not know the reason of these frames. Are they trying to lead the user to real malware? If not, then the site just uses frames to their advantage in producing ads.
Bookmarked the minotaur analysis site. 
Hi !Donovan,
There is this frame there ^!DOCTYPE HTML PUBLIC “-/W3C/DTD HTML 4.01 Frameset/EN” “htxp:/www.w3.org/TR/html4/frameset.dtd”^ with in the code a "cookie_cllbck = function(vl)" ///[a= by me polonus]////
polonus