Using a more convential way does not deliver: http://urlquery.net/report.php?id=9399534
But zuluZscaler delivers the results we want: http://zulu.zscaler.com/submission/show/54a9e4ed526a4c85d2f37a59ecab3b0f-1392165342
Read about type of malcode: http://www.feedurbrain.com/forum/showthread.php?31778-Friendly-Warning-About-Malware-on-this-site-effecting-others
poster = Magnes
domain is parked → htxp://www.dsparking.com/w3c/p3p.xml
An unconventional scan to further help us: http://webcookies.info/cookies/ww2.fenkaololo.com/1126563/
Server configuration is questionable see info at HTTP security related headers
http://blogs.msdn.com/b/ie/archive/2009/01/27/ie8-security-part-vii-clickjacking-defenses.aspx
http://www.w3.org/TR/CSP/
http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx
http://msdn.microsoft.com/en-us/library/ie/gg622941(v=vs.85).aspx
General website insecurities:
excessive header info, clickjacking vulnerability.
Also see this scan: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fww2.fenkaololo.com%2Fmmmsss%2Fxpxlkzbuaodwitdwy.php
and the hit->
<frame src="htxp://ww2.fenkaololo.com? etc. etc.

polonus