Proxy Request c65ac727-9aa2-4496-9297-d95b39fb1c2c

Parent Attack dc0b0d67-196d-4887-85e7-90163efb2f18
Date 2019-11-14 01:31:18PM
URL
endilomedia.com/offer/go/10529587/2?booter=1
Form Data ["booter: 1"]
Headers ["Referer: http://google.com/", "User-Agent: Mozilla/5.0 (Linux; Android 8.2.1; Casper_VIA_V8 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.126 Mobile Safari/537.36", "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Encoding: gzip, deflate", "Accept-Language: en-US,en;q=0.5", "Connection: keep-alive"]
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
    <meta charset = "utf-8" />
    <link rel="icon" href="data:,">
    <meta http-equiv="refresh" content="5; url=https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle">
    <title>QVERSE</title>
    <script type = "text/javascript" >
        window.location = 'https://adright.g2afse.com/click?pid=117&offer_id=3434119&sub2=119111315071247c81ch23129641941&sub1=1445_1979183&sub3=3F1417F3-26E1-4C1C-9917-696BB12B3695&sub5=HexagonBlockPuzzle'
    </script>
</head>
<body>
</body>
</html>
© 2021 threat.gg