Proxy Request 5c85d868-3755-4064-94c2-ae45c4461482

Parent Attack b17e96cf-a365-4a00-bf54-d8e1f86c1166
Date 2019-11-14 12:54:49PM
URL
endilomedia.com/offer/go/10529587/2?booter=1
Form Data ["booter: 1"]
Headers ["User-Agent: Mozilla/5.0 (Linux; Android 8.0.0; SAMSUNG SM-G965F Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/7.4 Chrome/59.0.3071.125 Mobile Safari/537.36", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5", "Connection: keep-alive", "Referer: http://google.com/"]
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
    <meta charset = "utf-8" />
    <link rel="icon" href="data:,">
    <meta http-equiv="refresh" content="5; url=https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle">
    <title>QVERSE</title>
    <script type = "text/javascript" >
        window.location = 'https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle'
    </script>
</head>
<body>
</body>
</html>
© 2021 threat.gg