Does avast block this potentially suspicious site. Does it have malware?

Here it says malicious: http://urlquery.net/report.php?id=1489321915264
Here one detection by Fortinet’s only: https://www.virustotal.com/pl/url/eef464e638bdb3500d260b89365b2179de66c5dfd387911421cebb43725c3db9/analysis/1489322704/

ISSUE DETECTED DEFINITION VULNERABLE HEADER
Outdated Web Server Nginx Found Vulnerabilities on nginx nginx/1.2.1

comments/script.js
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details:

Too low entropy detected in string [[‘/[\u0000\u00ad\u0600-\u0604\u070f\u17b4\u17b5\u200c-\u200f\u2028-\u202f\u2060-\u206f\ufeff\ufff0-\uf’]] of length 106 which may point to obfuscation or shellcode.

quote taken from third party Quttera scan results, credits should go there (pol).

jQuery library to be retired: -http://pcremontnik.pp.ua
Detected libraries:
jquery - 1.11.0 : (active1) http://code.jquery.com/jquery-1.11.0.min.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code

F-Status: https://observatory.mozilla.org/analyze.html?host=pcremontnik.pp.ua

B-Status with just that very same script issue with sri hash missing: https://sritest.io/#report/5d3bc606-36ea-45ca-aa3f-1a42212f900d

See: http://toolbar.netcraft.com/site_report?url=pcremontnik.pp.ua

PHP used on that site, only generally a quarter of sites with PHP are known to not have security issues, see attached image.
PHP is a hackers dream as one cannot trust returned requests in many occasions. So refrain from using it.
PHP based languages like WordPress also have a lot of issues, especially in the hands of security n00bs,
So do not tell me I did not warn you website developers!

polonus (volunteer website security analyst and website error-hunter)

For js/jquery.formstyler.min.js → -https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=pcremontnik.pp.ua%2Fjs%2Fjquery.formstyler.min.js&ref_sel=GSP2&ua_sel=ff&fs=1

Re and view inside: https://codepen.io/IQ-RAER/pen/KosyJ

No sinks: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fpcremontnik.pp.ua%2Fjs%2Fjquery.formstyler.min.js+

Errors in the code

found JavaScript
error: undefined variable jQuery
error: undefined variable d.fn
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var d.fn = 1;
error: line:1: …^
global variables are shunned for reasons too detailed to go into here (info credits go to StackOverflow’s Joe Parker) should be passed as parameter. Don’t use brackets with it …

Furthermore see the live internet cookie here: https://webcookies.org/cookies/pcremontnik.pp.ua/3129032
third party persistent cookie =counter.yadro.ru/hit? Security Header Score = 0

Also consider: https://nerdydata.com/search?query=jquery.formstyler.min.js

Also consider the three warnings here: https://asafaweb.com/Scan?Url=pcremontnik.pp.ua
See: index_defaultpage.html 395 text/html PHPSESSID=528XXXXXXXXXXe40d4aa97afba5a47d6; path=/ 200
and many many more …FILE##hit?t44.1;r"+escape(document.referrer)+((typeof(screen)==“undefined”)?“”:“;s”+screen.width+““+screen.height+””+(screen.colorDepth?screen.colorDepth:screen.pixelDepth))+“;u”+escape(document.URL)+“;”+Math.random()+" 210 text/html 302 0 / 0 2 0 1 0 -1 0 0 0 1 0 0 /-counter.yadro.ru/hit flagged!
-EXTRALINK##hxtp://hq1f-filuees.hh-dom.pp.ua/comments/widget_logo.gif 1 (host does not have DMARC!)
http://toolbar.netcraft.com/site_report?url=http%3A%2F%2Fhq1f-filuees.hh-dom.pp.ua%2Fcomments%2Fwidget_logo.gif

DEADLINK##/wXw.liveinternet.ru/click and various deadlinks to videos.

polonus (volunteer website security analyst and website error-hunter)