No alerts here:
http://urlquery.net/report.php?id=318597Some code hick-ups found up by Quttera's heuristic scanner in the following 4 files.
This does not mean that these should be malicious per se, only have anomalities to make them stand out from the rest of the files there...
all-include.js
File size[byte]: 173286
Threat type: Potentially Suspicious
Details: Detected potentially suspicious content.
Reason: Detected potentially suspicious initialization of function pointer to JavaScript method writeln <code> __tmpvar1699510875 = writeln; <code/>
MD5: 54D6DF7CB5DAC605790C363683027FB8
/include/js/DD_roundies_0.0.2a-min.js
File size[byte]: 8429
Threat type: Potentially Suspicious
Details: Detected potentially suspicious content.
Reason: Detected potentially suspicious initialization of function pointer to JavaScript method writeln <code> __tmpvar183615581 = writeln; <code/>
MD5: B8B9F888948D72009322CFD0FEE48E0E
chatserver.comm100 dot com/js/LiveChat.js?siteId=128909&planId=2104&partnerId=-1 (web rep four greens)
File size[byte]: 26398
Threat type: Potentially Suspicious
Details: Detected hidden reference to external web resource.
Reason: Detected generation of hidden DOM element [iframe].
MD5: 8584A6F23E4FC7454E18CFF2237DAF67
Scan duration[sec]: 0.777000
s7.addthis dot com/js/250/addthis_widget.js#pubid=ra-4ec907345df988e1
File size[byte]: 6721
Threat type: Potentially Suspicious
Details: Detected hidden reference to external web resource.
Reason: Detected generation of hidden DOM element [iframe].
MD5: 9ADEDD301F5AA4594680A852630E56AB
source: Quttera's scan data
polonus