Proxy Request 4f43b97e-3604-4464-b8da-e514b92f977f

Parent Attack c65a2643-ee83-4430-88a1-d982a7c08912
Date 2019-11-14 12:34:39PM
URL
endilomedia.com/offer/go/10529587/2?booter=1
Form Data ["booter: 1"]
Headers ["User-Agent: Mozilla/5.0 (Linux; Android 7.1.2; Micromax HS2 Build/N2G47H; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/62.0.3202.84 Mobile Safari/537.36", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5", "Connection: keep-alive", "Referer: http://google.com/"]
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
    <meta charset = "utf-8" />
    <link rel="icon" href="data:,">
    <meta http-equiv="refresh" content="5; url=https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle">
    <title>QVERSE</title>
    <script type = "text/javascript" >
        window.location = 'https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle'
    </script>
</head>
<body>
</body>
</html>
© 2021 threat.gg