See: http://urlquery.net/report.php?id=8169284
https://www.virustotal.com/nl/url/8835a4f4a707e40a64827fceab963e56ab1e70179347b83376cd770e2819dcb0/analysis/1386256211/
https://www.virustotal.com/nl/file/4b4961f7d134838f1d828384e21d971aebea3aa3d03623f1572efd61d6ca85e9/analysis/1374716085/
avast! does not flag.
Suspicious javascript code injection found (7 instances) http://quttera.com/detailed_report/www.arroyomu.com.ar
see: wXw.arroyomu.com.ar/content/index.php → http://jsunpack.jeek.org/?report=ee91a094c434ea1e99cb5e303360c68481ebe631
see: http://jeffsoh.blogspot.nl/2012/07/javascript-unescape-obfuscated-code.html link by JeffSoh on NetSec
Decoded document.write(unescape(‘’)); could be benign (decoded by me, pol via HexDecoder)
link evaluation: http://jsunpack.jeek.org/?report=add4342633a509a6cc6e045fbe6fd3a18e0bc2a5
and http://jsunpack.jeek.org/?report=abe1910fe5fef1863531c4595c6f62b5d7f0c715
ON IP arroyomu dot net flagged by Bitdefender’s TrafficLight as with malware,
pol