DrWeb flags as “known infection source/not recommended site”.
See: http://killmalware.com/muzico.ru/#
See: http://fetch.scritch.org/%2Bfetch/?url=muzico.ru&useragent=Fetch+useragent&accept_encoding=
Detected libraries:
jquery - 1.10.2 : (active1) -http://muzico.ru/static/js/jquery.js
(active) - the library was also found to be active by running code
which does not need to be retired, but with sinks and sources on a dom xss scan:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fmuzico.ru%2Fstatic%2Fjs%2Fjquery.js
landing here at -Results from scanning URL: htxp://www.greatis.com/unhackme/js/jquery/jquery.easing.1.3.min.js
Number of sources found: 0
Number of sinks found: 0
and esults from scanning URL: htxp://www.google.com/coop/cse/brand?form=cse-search-box&lang=en
Number of sources found: 3
Number of sinks found: 3
and Results from scanning URL: -http://www.greatis.com/unhackme/js/jquery/jquery.easing.1.3.min.js
Number of sources found: 25
Number of sinks found: 12
and
Results from scanning URL: -http://www.statcounter.com/counter/counter.js
Number of sources found: 27
Number of sinks found: 14
Sucuri flags it as potentially unsafe: https://sitecheck.sucuri.net/results/muzico.ru#blacklist-status
swf request code detected. uBlock protected against: -http://am15.net/bn.php?s=4153&f=3&d=71647
Because of the following filter
||am15.net^
Found in: hpHosts’ Ad and tracking servers • MVPS HOSTS
link to Notice: Undefined index: HTTP_REFERER in -/var/www/igorvas/data/www/videoroll.net/kod.php on line 23
Notice: Undefined offset: 0 in -/var/www/igorvas/data/www/videoroll.net/kod.php on line 35
Quttera flags: -jsc.dt00.net/m/u/muzico.ru.8506.js?t=
Severity: Potentially Suspicious
Reason: Detected potentially suspicious content.
Details: Potentially suspicious obfuscated PHP threat
Offset: 36980 code see attached image… jsc.dt00.net/m/u/muzico.ru.1536.js?t=
Severity: Potentially Suspicious
Reason: Detected potentially suspicious content.
Details: Potentially suspicious obfuscated PHP threat see attached…
polonus