For users that have to wrestle with Win32/Toolbar.Conduit, Win32/Wajam (variant), Win32/Kryptik.BVVE (variant), Win3etc.
to leave their devices, this is no fun, I can assure you - one needs AdwareCleaner, JRT removal software and reset the browser settings to their defaults. Better avast! was to flag this crap dealer. 8)
First difference:
dif]–> fertilizer producer<!–[if lt ie 9]> <script src="http:…
External links to be checked: htxp://studenthealth.uiowa.edu/wellness → ‘htxp://studenthealth.uiowa.edu’
htxp://www.sph.umd.edu/hlsa/programs/phd_program.cfm → ‘htxp://www.sph.umd.edu/hlsa/pr’ benign
htxp://statcounter.com/free-hit-counter/ → ''blocked by one of my extensions"
Scam site because of code see attached fetch3 (non-visible statcounter code - reported at scammed.by forums
Detected encoded JavaScript code commonly used to hide malicious behaviour.
Included script check: Suspect - please check list for unknown includes
htxp://www.aafencing.co.uk/count.php?id=5732232 => htxp://www.spiderline.net/fetch.php?q=site%3Awww.aafencing.co.uk&page=10 (!ink broken by me because of questionable WOT web rep. pol)
I generated the code for htxp://balconesdebentomiz.com/js/swfobject.js (uri found to be suspicious} using the online bobby van der sluis generator, see the results attached:
Very interesting for those into comparing the actual uri code and what should be generated there ;D
See URI Debugger actual injected code
Great pleasure that I can report that avast! Webshield detects and blocks access to the site as infested with JS:Includer-BVV[Trj].
We are being protected.