What is http_inspect: MULTIPLE ENCODINGS WITHIN JAVASCRIPT OBFUSCATED DATA

See here: http://urlquery.net/report.php?id=7497135
Status as scam site: http://www.mywot.com/en/scorecard/download.televisionfanatic.com?utm_source=addon&utm_content=popup-donuts
adware provider → http://www.mywot.com/forum/4185-iaccap-com-and-other-adware-providers?comment=67314#comment-67314
ON IP detections: https://www.virustotal.com/nl/ip-address/74.113.233.180/information/
See: http://www.site2ip.com/ip/74.113.233.180

pol

For the Snort SID → http://www.snort.org/search/sid/120-11
Utility class for all HTML drawing classes->

IP listed here: bl.spamcannibal.org

HTTP/1.1 301 Moved Permanently
Date: Thu, 07 Nov 2013 20:01:51 GMT
Server: Apache
Location: http://www./
Content-Length: 220
Connection: close
Content-Type: text/html; charset=iso-8859-1

301 Moved Permanently

Moved Permanently

The document has moved here.

Site downloaded toolbar → htxp://eula.mindspark.com/ask/uninstall/ Scam toolbar apps

See: http://www.mywot.com/en/scorecard/eula.mindspark.com?utm_source=addon&utm_content=rw-viewsc

polonus

DNS issues for this adware distributor: http://www.robtex.com/dns/download.televisionfanatic.com.html
and http://bgp.he.net/dns/download.televisionfanatic.com

Additional info (credits go to jefferson santiag) http://wepawet.iseclab.org/view.php?hash=ccc7bfd8eb29a6fbc10b0cb843be3e6e&t=1383861032&type=js

polonus