Now that you have removed all of the front ends that redirect to the warntoprotect.com host (toolbarfornew.com, urlsofdnserrors.com, waysofsecurity.com, websclinks.com, whyisdnserror.com, et al) you may want to consider blocking it. I don't think it meets your critera. It does meet mine since a FlashPlayer display on Linux showing all the stuff I have wrong although humorous is false advertising. The warntoprotect.com can actually be nobbled by just blocking js.warntoprotect.com. It does not trap you (no browser exploit).
The actual download though comes from this host and the astrumavrpro.com will take you the same place. The scan of the file is here:
http://www.virustotal.com/analisis/f5447ab9f04fa90cef88158c1e4a1c88Lots of pretty red markers for a file that actually has a 16-l copyright string in it. But I am not going to block the host unless you do. I will be blocking warntoprotect though. That is an exploit from my classification scheme. Pretending to scan a system when you aren't doing it at all is wrong.