Proxy Request 33d1c077-b5a4-48f8-aaf0-75eebcb76359

Parent Attack 95aba780-f091-4215-92fd-3f7120892095
Date 2019-11-14 01:16:59PM
URL
endilomedia.com/offer/go/10529587/2?booter=1
Form Data ["booter: 1"]
Headers ["Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5", "Connection: keep-alive", "Referer: http://google.com/", "User-Agent: Mozilla/5.0 (Linux; Android 7.0; SAMSUNG SM-G925F Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/5.4 Chrome/51.0.2704.106 Mobile Safari/537.36", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"]
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
    <meta charset = "utf-8" />
    <link rel="icon" href="data:,">
    <meta http-equiv="refresh" content="5; url=https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle">
    <title>QVERSE</title>
    <script type = "text/javascript" >
        window.location = 'https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle'
    </script>
</head>
<body>
</body>
</html>
© 2021 threat.gg