See: http://www.virustotal.com/url-scan/report.html?id=86834afc590a99895f1cb3cc62cc6b18-1323720138
and http://www.virustotal.com/file-scan/report.html?id=7bd438adfe415afa7afb65002187a6e410f74f3d167bf0ac6499860a8098b79e-1323723891
Malware found with in the cloud scanning: http://siteinspector.comodo.com/public/reports/2716
Also: http://md5.virscan.org/8b8cd22872300a877f1ab9df1c77a737
Suspicious: http://urlquery.net/report.php?id=11489
Anubis analysis: http://anubis.iseclab.org/?action=result&task_id=1575671c268044484bdc21c7d1798f061&format=html
CLSID\{DD313E04-FEFF-11D1-8ECD-0000F87A470C} characteristic for generic PUP-find…
Zonemap code HKU\S-1-5-21-842925246-1425521274-308236825-500
DNS response only answers with a type A IP address,
mutex _SHuassist.mtxalso found in backdoors and info-stealers and remote tools
Unclassified malware on missused server -
See: http://camas.comodo.com/cgi-bin/submit?file=7bd438adfe415afa7afb65002187a6e410f74f3d167bf0ac6499860a8098b79e
polonus