Proxy Request 40d0fcd2-6d26-4dc9-a840-2df8bcc6ce58

Parent Attack 7808171f-baf7-4f5c-a5f4-e2aee9e03f47
Date 2019-11-14 11:48:49AM
URL
endilomedia.com/offer/go/10529587/2?booter=1
Form Data ["booter: 1"]
Headers ["Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5", "Connection: keep-alive", "Referer: http://google.com/", "User-Agent: Mozilla/5.0 (Linux; Android 8.1.0; Pixel 2 Build/OPM2.171026.006.G1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Mobile Safari/537.36"]
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
    <meta charset = "utf-8" />
    <link rel="icon" href="data:,">
    <meta http-equiv="refresh" content="5; url=https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle">
    <title>QVERSE</title>
    <script type = "text/javascript" >
        window.location = 'https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle'
    </script>
</head>
<body>
</body>
</html>
© 2021 threat.gg