Site definitely has issues. Main site still blocked as with URL:Mal!
Original malcode was found in htxp://cheat-help.ru/load/css/6 → http://jsunpack.jeek.org/?report=4dd9a9a3869ab8c6ee6f285ed501ed3f08591261
An iFrame check comes up as suspicious: Suspicious
/abnl/?adsdata=1dxq0vw8w5fr4vugxbz^nclg!gy1mpjj7pbx0cgerevnyj5x0h4lri2iun;7ahawzusdtqhgrdkccx^tl^o0v’
Injection check comes up as right-out malicious:
Suspicious Text before HTML view code here: http://jsunpack.jeek.org/?report=a007f3488a1b3c281dc3edcf19cd3c17f3e0f5f8
Javascript Check comes up as: Suspicious
().src = “htxp://counter.yadro.ru/hit;ucoznet?r”+escape(document.referrer)+((typeof(screen)==“undefined”)?“”:“;s”+screen.width+““+screen.height+””+(screen.colordepth?screen.color…
Included scripts check comes up as suspicious: Suspect - please check list for unknown includes
htxp://rtrgt2.com/apu.php?zoneid=1708

Suspicious Script:
htxp://rtrgt2.com/apu.php?zoneid=1708
document.createelement(‘iframe’); iframeb0f5caa.setattribute(‘style’, ‘display:none; position:absolute; top:0px; left:0px;’); iframe
Suspicious Script:
htxp://s80.ucoz.net/src/uwnd.js?2
.ru/i)){g=1;var a=/v=([^\s&;]+)/;var d=a.exec(b.url);if(d&&d[1]){n=“htxp://video.rutube.ru/”+d[1];l=640;f=360}}else{if(b.url.match(/dailym

404 Error Check comes up as suspicious: Suspicious
Suspicious 404 Page:
.ru/e.gif?p=u404" width=0 height=0> new image().src = "http://

Despite of this code mess, I get no avast! alert on htxp://cheat-help.ucoz.ru/panel/?a=ustat&u=cheat-help&d=0&il=ru&sdc=1
There are php vulnerabilities found for userv/3.2.2
This external link has Web Rep issues: https://www.mywot.com/en/scorecard/spotsniper.ru?utm_so
also consider: http://www.quttera.com/detailed_report/free-aim-wf.ucoz.ruhttp://jsunpack.jeek.org/?report=01855d2faf8eda2deaeba6a32e7715309e7bf1dc
This malware from same IP has apparently been closed: http://support.clean-mx.de/clean-mx/viruses.php?id=14815911

polonus