I was beginning to remove some of the hosts you removed about a week ago from my file (SecureMecca.com / HostsFile.org). They may have became harmless but now they are back in business. Here are some of them (there are probably more) for this particular exploit (a flash file pretending to be a scan but they don't lock you into place with JavaScript):
ourcheckpoisonpro.cn
yourguard4you.cn
yourguardforyou.cn
They may be doing it a little bit differently now than they were doing it. Now they use a host named onlinescanweb.com which is dead host causing HUNDREDS of DNS queries on the part of Firefox which slows the machine down to a crawl so that they can slip your machine the mickey, a file named installer_1.exe with the following characteristics:
installer_1.exe (renamed installer_1.exe.BAD):
===============================================
MD5: d1f4cd0a7a4af84a095d562cc3824f61
SHA1: cef78210f369f6f7b590d5a50b7d9bce5ef9a2de
Date: 02 Jun 2009 (764928)
From: yourcheckpoisonpro.cn, yourguard4you.cn, yourguardforyou.cn
Prob: ClamAV: OK
Avast: OK
AVG: SHeur2.AJCC
VirusTotal Scan:
http://preview.tinyurl.com/qav87qThis is why you need to put these hosts you remove in a list and from time to time come back and look at them. They frequently come back to life once they know the heat is off. It seems like some of these dumped themselves at those IP addresses that had no web server but were not parkers. I don't have the entire IP address space that they were using over time so I have no way to know for sure. I do know that they are back in business now and I am still blocking them. So, if you have enough people, have some of them check these removals over several weeks and / or months time. It would be a simple matter to put them at these goofy IP addresses, or substitute a different index.html. Then once the heat is off and you have stopped blocking them, they can put them back the way they were. Even going to a park service is no assurance that they won't rise from the ashes again. I have especially had problems with GoDaddy but there are other park services that don't check enough. Some don't even move the host that is coming off of park status and activate them at the park IP address with the very same exploit and sometimes even distributing malware so you have to check for that as well. I mentioned that to GoDaddy and got no place. I also told the Mozilla / Firefox to stop doing DNS requests forever. If the DNS server won't return an IP address after five queries, they should just assume it is dead. These malware pushers are using these weaknesses of the browser doing hundreds of DNS queries to bog the machine down so they can infect it. If this was fixed with 3.0 (I am still using 2.x) I have no way to check for that either. If you ask me, a db for some bookmarks was dumb. Before I could easily copy the bookmarks from Linux to OpenBSD and Windows. Now?
I guess that means I now have to check all of the current crop of removals for their IP address and if they are not parked or dead look at each one of them individually. I will give you the list of what I have retained when I am done. I even had to go back and recheck some of them to put them back in.

Au Revoir