Parked site cleansed of SE redirect and still vulnerable....

Re: http://killmalware.com/badem.com/#
parked and expired site: Script loaded:
kicks up

//alert(‘cookie params wrong’);

Re: http://toolbar.netcraft.com/site_report?url=http://return.uk.uniregistry.com

  info: [script] return.uk.uniregistry.com/js.php?d=badem.com&s=1463504318
     info: [script] 127.0.0.1/js/jquery.min.js
     info: [frame] 127.0.0.1/tg.php?uid=badem573b4dbed4b000.89281220
     info: [frame] 127.0.0.1/caf.php?uid=badem573b4dbed4b000.89281220&src=mountains&abp=1&country=NL
     info: [frame] 127.0.0.1/page.php?badem573b4dbed4b000.89281220 

Could such admin bars been targeted by attackers.
Consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fbadem.com%2F
where I get


[nothing detected] script
     info: [decodingLevel=0] found JavaScript
     error: line:5: SyntaxError: missing } after function body:
          error: line:5: 
          error: line:5: ^
     error: line:4: SyntaxError: missing = in XML attribute:
          error: line:4: <!DOCTYPE HTML PUBLIC "-/W3C/DTD HTML 4.01/EN" "-http:/www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <meta http-equiv="Content-Script-Type" content="text/javascript"> <scri
          error: line:4: .....................^

polonus (volunteer website security analyst and website error-hunter)