See: http://killmalware.com/artemultimedia.net/
and https://www.virustotal.com/nb/url/42bce15b3b1136b0981c45dccfb21352cfcbb3bd88e874bfd08b6e019fc77d72/analysis/1419802975/
No response: http://urlquery.net/report.php?id=1419802953244
See the malcode here: http://jsunpack.jeek.org/?report=3ce547e5e6565d00b47ff8b6ca47acb4aa86d21d
For security resaerch only, open up in browser with NoScript extension active and inside a VM/sandbox.
Known javascript malware. Details: http://labs.sucuri.net/db/malware/mwjs-iframe-injected691?v27
document.write(‘’); Unsafe: http://shutkeys.net/customerloyaltyhosting.com & http://www.urlvoid.com/scan/customerloyaltyhosting.com/
A Remote and malicious iframe was identified. It uses javascript to generate the iframe dynamically on the browser of anyone visiting the compromised site. Avast detects as JS:Agent-CSV [Trj]. DrWeb URL-checker: htxp://artemultimedia.net/js/jquery/jquery-1.11.0.min.js infected with JS.IFrame.575
polonus