Re: https://urlquery.net/report/59ab54be-9b64-4ee7-820e-0621c637cd35
5 to detect: https://www.virustotal.com/nl/url/f662db431511a8d33e64a0e6d8f6cb6da99b9ca1516b699b5cbd39bfbcbafbba/analysis/1514928554/
Blacklisted: https://sitecheck.sucuri.net/results/xiaoerzhuan.top
Script loaded with error
(script) -c.cnzz.com/core.php?id=1260216392&t=z
info: [img] -c.cnzz.com/
info: [decodingLevel=0] found JavaScript
error: undefined variable window[“_CNZZD” + b]
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var window[“_CNZZD” + b] = 1;
error: line:1: …^
More error and warning here: https://asafaweb.com/Scan?Url=xiaoerzhuan.top
File also flagged by Google safe browsing: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=xiaoerzhuan.top&ref_sel=GSP2&ua_sel=ff&fs=1
weixin.html detected malicious obfuscated javascript drive-by download threat source code line 10 → https://quttera.com/detailed_report/xiaoerzhuan.top
polonus