Submitted URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-f=
Effective URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Submission: On March 11 via api from US

Summary

This website contacted 50 IPs in 8 countries across 40 domains to perform 236 HTTP transactions. The main IP is 35.173.160.135, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is threatpost.com.
TLS certificate: Issued by Thawte EV RSA CA 2018 on June 17th 2019. Valid for: a year.
This is the only time threatpost.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 19 35.173.160.135 14618 (AMAZON-AES)
11 143.204.202.47 16509 (AMAZON-02)
5 2606:4700:303... 13335 (CLOUDFLAR...)
18 2a00:1450:400... 15169 (GOOGLE)
5 2600:9000:215... 16509 (AMAZON-02)
10 2600:9000:214... 16509 (AMAZON-02)
1 1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.77.2 2635 (AUTOMATTIC)
3 6 2a00:1450:400... 15169 (GOOGLE)
25 194.146.38.23 41436 (CLOUDWEBM...)
7 172.217.22.98 15169 (GOOGLE)
2 216.52.2.19 29791 (VOXEL-DOT...)
3 185.33.223.200 29990 (ASN-APPNEX)
1 2 165.227.252.242 14061 (DIGITALOC...)
5 185.64.189.112 62713 (AS-PUBMATIC)
10 25 152.199.22.24 15133 (EDGECAST)
2 3 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.146 27281 (QUANTCAST)
1 151.101.12.157 54113 (FASTLY)
1 104.244.42.133 13414 (TWITTER)
1 2600:9000:214... 16509 (AMAZON-02)
2 99.86.0.120 16509 (AMAZON-02)
1 2 54.164.251.147 14618 (AMAZON-AES)
1 2 91.228.74.169 27281 (QUANTCAST)
2 2a00:1450:400... 15169 (GOOGLE)
21 212.115.108.177 210329 (CLOUDWEBM...)
1 2a00:1450:400... 15169 (GOOGLE)
10 2a00:1450:400... 15169 (GOOGLE)
2 9 34.95.120.147 15169 (GOOGLE)
2 35.158.0.61 16509 (AMAZON-02)
10 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 104.244.42.131 13414 (TWITTER)
1 2a03:2880:f01... 32934 (FACEBOOK)
1 2a05:f500:10:... 14413 (LINKEDIN)
1 151.101.13.140 54113 (FASTLY)
2 23.37.55.184 16625 (AKAMAI-AS)
1 72.247.225.32 16625 (AKAMAI-AS)
1 72.247.225.17 16625 (AKAMAI-AS)
1 205.185.216.42 20446 (HIGHWINDS3)
6 6 52.28.46.116 16509 (AMAZON-02)
3 7 3.126.56.137 16509 (AMAZON-02)
1 2 2a00:1288:110... 34010 (YAHOO-IRD)
2 3 52.212.184.249 16509 (AMAZON-02)
1 2a02:fa8:8806... 25751 (VALUECLICK)
2 52.58.103.169 16509 (AMAZON-02)
1 1 172.217.22.66 15169 (GOOGLE)
236 50
Apex Domain
Subdomains
Transfer
46 sekindo.com
live.sekindo.com
video.sekindo.com
3 MB
33 advertising.com
adserver-us.adtech.advertising.com
ads.adaptv.advertising.com Failed
pixel.advertising.com
10 KB
33 threatpost.com
threatpost.com
assets.threatpost.com
media.threatpost.com
963 KB
21 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
330 KB
14 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
googleads.g.doubleclick.net
cm.g.doubleclick.net
100 KB
11 adlightning.com
tagan.adlightning.com
270 KB
10 ampproject.org
cdn.ampproject.org
302 KB
9 yahoo.com
ups.analytics.yahoo.com
pr-bh.ybp.yahoo.com
7 KB
9 openx.net
teachingaids-d.openx.net Failed
u.openx.net
primis-d.openx.net
2 KB
8 google.com
www.google.com
adservice.google.com
1 KB
6 pubmatic.com
hbopenbid.pubmatic.com
ads.pubmatic.com
295 B
6 googletagservices.com
www.googletagservices.com
150 KB
5 google.de
adservice.google.de
www.google.de
735 B
5 admetricspro.com
qd.admetricspro.com
163 KB
4 rubiconproject.com
fastlane.rubiconproject.com Failed
prebid-server.rubiconproject.com
eus.rubiconproject.com
721 B
4 adnxs.com
ib.adnxs.com
acdn.adnxs.com
4 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 quantserve.com
secure.quantserve.com
pixel.quantserve.com
7 KB
3 google-analytics.com
www.google-analytics.com
18 KB
2 googleapis.com
fonts.googleapis.com
1 KB
2 adrta.com
adrta.com
ipds.adrta.com
787 B
2 amazon-adsystem.com
c.amazon-adsystem.com
28 KB
2 gstatic.com
www.gstatic.com
fonts.gstatic.com
103 KB
2 serverbid.com
e.serverbid.com
sync.serverbid.com
843 B
2 lijit.com
ap.lijit.com
723 B
1 dotomi.com
aol-match.dotomi.com
104 B
1 digitaloceanspaces.com
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
1 reddit.com
www.reddit.com
1 KB
1 linkedin.com
www.linkedin.com
1 facebook.com
graph.facebook.com
544 B
1 twitter.com
analytics.twitter.com
652 B
1 quantcount.com
rules.quantcount.com
357 B
1 t.co
t.co
448 B
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 googletagmanager.com
www.googletagmanager.com
24 KB
1 wp.com
i1.wp.com
65 B
1 gravatar.com
secure.gravatar.com
334 B
1 kasperskycontenthub.com
kasperskycontenthub.com
338 B
0 adap.tv Failed
sync.adap.tv Failed
0 casalemedia.com Failed
as-sec.casalemedia.com Failed
236 40
Domain Requested by
25 adserver-us.adtech.advertising.com 10 redirects threatpost.com
25 live.sekindo.com threatpost.com
live.sekindo.com
21 video.sekindo.com threatpost.com
live.sekindo.com
18 threatpost.com 1 redirects threatpost.com
securepubads.g.doubleclick.net
www.google-analytics.com
11 pagead2.googlesyndication.com tagan.adlightning.com
pagead2.googlesyndication.com
threatpost.com
11 tagan.adlightning.com threatpost.com
tagan.adlightning.com
10 cdn.ampproject.org securepubads.g.doubleclick.net
threatpost.com
10 tpc.googlesyndication.com tagan.adlightning.com
threatpost.com
cdn.ampproject.org
10 media.threatpost.com threatpost.com
7 ups.analytics.yahoo.com 3 redirects threatpost.com
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
threatpost.com
6 pixel.advertising.com 6 redirects
6 www.google.com 3 redirects threatpost.com
tagan.adlightning.com
6 www.googletagservices.com threatpost.com
tagan.adlightning.com
securepubads.g.doubleclick.net
5 u.openx.net 2 redirects qd.admetricspro.com
live.sekindo.com
5 hbopenbid.pubmatic.com qd.admetricspro.com
live.sekindo.com
5 assets.threatpost.com threatpost.com
5 qd.admetricspro.com threatpost.com
4 googleads.g.doubleclick.net tagan.adlightning.com
threatpost.com
pagead2.googlesyndication.com
3 match.adsrvr.org 2 redirects threatpost.com
3 www.google-analytics.com 2 redirects threatpost.com
3 ib.adnxs.com qd.admetricspro.com
live.sekindo.com
3 adservice.google.de tagan.adlightning.com
2 primis-d.openx.net live.sekindo.com
2 pr-bh.ybp.yahoo.com 1 redirects threatpost.com
2 eus.rubiconproject.com qd.admetricspro.com
live.sekindo.com
2 adservice.google.com tagan.adlightning.com
2 ads.adaptv.advertising.com live.sekindo.com
2 prebid-server.rubiconproject.com live.sekindo.com
2 fonts.googleapis.com live.sekindo.com
2 pixel.quantserve.com 1 redirects threatpost.com
2 c.amazon-adsystem.com live.sekindo.com
c.amazon-adsystem.com
2 www.google.de threatpost.com
2 stats.g.doubleclick.net 2 redirects
2 teachingaids-d.openx.net qd.admetricspro.com
live.sekindo.com
2 ap.lijit.com qd.admetricspro.com
1 cm.g.doubleclick.net 1 redirects
1 aol-match.dotomi.com threatpost.com
1 serverbid-sync.nyc3.cdn.digitaloceanspaces.com qd.admetricspro.com
1 sync.serverbid.com 1 redirects
1 acdn.adnxs.com qd.admetricspro.com
1 ads.pubmatic.com qd.admetricspro.com
1 www.reddit.com threatpost.com
1 www.linkedin.com threatpost.com
1 graph.facebook.com threatpost.com
1 analytics.twitter.com tagan.adlightning.com
1 fonts.gstatic.com threatpost.com
1 ipds.adrta.com threatpost.com
1 adrta.com 1 redirects
1 rules.quantcount.com secure.quantserve.com
1 t.co threatpost.com
1 static.ads-twitter.com www.googletagmanager.com
1 secure.quantserve.com www.googletagmanager.com
1 www.gstatic.com www.google.com
1 www.googletagmanager.com threatpost.com
1 e.serverbid.com qd.admetricspro.com
1 i1.wp.com threatpost.com
1 secure.gravatar.com 1 redirects
1 kasperskycontenthub.com threatpost.com
0 sync.adap.tv Failed threatpost.com
0 as-sec.casalemedia.com Failed qd.admetricspro.com
live.sekindo.com
0 fastlane.rubiconproject.com Failed qd.admetricspro.com
236 62
Subject Issuer Validity Valid
threatpost.com
Thawte EV RSA CA 2018
2019-06-17 -
2020-06-17
a year crt.sh
*.adlightning.com
Amazon
2019-08-19 -
2020-09-19
a year crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-02-04 -
2020-10-09
8 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-02-25 -
2020-05-19
3 months crt.sh
assets.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
kasperskycontenthub.com
Thawte RSA CA 2018
2019-06-14 -
2020-06-13
a year crt.sh
media.threatpost.com
Amazon
2020-03-04 -
2021-04-04
a year crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
www.google.com
GTS CA 1O1
2020-02-12 -
2020-05-06
3 months crt.sh
www.sekindo.com
Go Daddy Secure Certificate Authority - G2
2019-05-23 -
2020-06-18
a year crt.sh
*.google.com
GTS CA 1O1
2020-02-25 -
2020-05-19
3 months crt.sh
*.lijit.com
Go Daddy Secure Certificate Authority - G2
2019-03-11 -
2020-05-10
a year crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
e.serverbid.com
Let's Encrypt Authority X3
2019-12-25 -
2020-03-24
3 months crt.sh
*.pubmatic.com
Sectigo RSA Organization Validation Secure Server CA
2019-02-22 -
2021-02-21
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2020-02-25 -
2020-05-19
3 months crt.sh
www.google.de
GTS CA 1O1
2020-02-12 -
2020-05-06
3 months crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
*.adrta.com
COMODO RSA Domain Validation Secure Server CA
2018-09-01 -
2020-08-31
2 years crt.sh
*.storage.googleapis.com
GTS CA 1O1
2020-02-12 -
2020-05-06
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-02-12 -
2020-05-06
3 months crt.sh
*.openx.net
GeoTrust RSA CA 2018
2018-01-04 -
2020-07-09
3 years crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
misc-sni.google.com
GTS CA 1O1
2020-02-25 -
2020-05-19
3 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-01-16 -
2020-04-15
3 months crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2019-11-21 -
2020-09-01
9 months crt.sh
*.reddit.com
DigiCert SHA2 Secure Server CA
2018-08-17 -
2020-09-02
2 years crt.sh
cdn.adnxs.com
GeoTrust RSA CA 2018
2020-01-02 -
2021-04-02
a year crt.sh
*.nyc3.cdn.digitaloceanspaces.com
DigiCert SHA2 Secure Server CA
2019-02-22 -
2020-03-24
a year crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-02-13 -
2020-08-11
6 months crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.dotomi.com
GlobalSign RSA OV SSL CA 2018
2019-06-19 -
2021-08-31
2 years crt.sh
*.vssp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2019-11-07 -
2020-05-05
6 months crt.sh
*.ybp.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-01-04 -
2020-07-02
6 months crt.sh

This page contains 24 frames:

Primary Page: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Frame ID: F3433BBD409B4AB2CE6B4531691A088D
Requests: 98 HTTP requests in this frame

Frame: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Frame ID: 2593CF635B58F899B1F358945328CE69
Requests: 48 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 254505238526223224FE5D4065C44488
Requests: 5 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Roboto&display=swap
Frame ID: 7F32F567412B1813FED1DA7935D6BCB4
Requests: 23 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Frame ID: 90A1955F59725DFAC3275F5F28DD60F9
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Frame ID: 14F9CF1E4AF4A563686B9484725A15C0
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Frame ID: 380AEB02243B0E05715637B504306763
Requests: 14 HTTP requests in this frame

Frame: https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Frame ID: 218E78A928B996875C9F032766308348
Requests: 10 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200305/r20190131/zrt_lookup.html
Frame ID: 235A9F3C0BAC5BCF6AB9666313DEC256
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196270&bpp=23&bdt=307&fdt=249&idt=249&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=2&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=930991092&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=355678223&scr_x=0&scr_y=0&oid=2&pvsid=135294659603584&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.h3ua6qq30auc&fsb=1&dtd=264
Frame ID: BB06B7E932AA24413CA197528710FAD4
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196343&bpp=9&bdt=366&fdt=235&idt=235&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=1&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=606140387&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=1300267184&scr_x=0&scr_y=0&oid=3&pvsid=2491139162590456&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbdr1xk8owic&fsb=1&dtd=242
Frame ID: C7072FDE5793FE59B6ED6B0CA2B5D21B
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 944AD9796468646558DA53309066FECC
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&theme=standard&size=normal&cb=v3kpkuq9hmlx
Frame ID: F88E7BA86958A61DC2CF31A4D1B99073
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/bframe?hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=ixj6do7qebek
Frame ID: BBFEC2D5FDFCAC5E28F2A378920789CD
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: E813A9CE01E928F5175139FEAA4270EB
Requests: 1 HTTP requests in this frame

Frame: https://ads.pubmatic.com/AdServer/js/showad.js
Frame ID: 452AAE6765EE999E0583D7EFCBEAE8CB
Requests: 1 HTTP requests in this frame

Frame: https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Frame ID: 5E14945C3DD04ED08B17982E4DF7B7E3
Requests: 1 HTTP requests in this frame

Frame: https://ap.lijit.com/beacon?informer=13394437
Frame ID: BDD591AA0A9218B4117709B01716CDF9
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd
Frame ID: 632C5D1B0B0F6BFACBC7C034093C3541
Requests: 1 HTTP requests in this frame

Frame: https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Frame ID: 990A62599AAF6B95A7A06A9F8B6CA606
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Frame ID: A07CB56D1FEAE0EF607E698DAA6E6DAF
Requests: 1 HTTP requests in this frame

Frame: https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Frame ID: 17C6D8A97A61FF3C514AD3B63AD68784
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Frame ID: B3CF602E3011E339004C7374219C4607
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: ABBC94061ECEEF117D32526AC5013C10
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-f= HTTP 301
    https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/prebid\.js/i

Overall confidence: 100%
Detected patterns
  • script /\.quantserve\.com\/quant\.js/i

Page Statistics

236
Requests

94 %
HTTPS

43 %
IPv6

40
Domains

62
Subdomains

50
IPs

8
Countries

6067 kB
Transfer

10345 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-f= HTTP 301
    https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 13
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g HTTP 302
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Request Chain 37
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
Request Chain 38
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
Request Chain 39
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
Request Chain 40
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
Request Chain 41
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
Request Chain 62
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=323611324&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ul=en-us&de=UTF-8&dt=Variant%20of%20Paradise%20Ransomware%20Targets%20Office%20IQY%20Files%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YEBAAUABC~&jid=1322383547&gjid=644903928&cid=1085220767.1583956194&tid=UA-35676203-21&_gid=231333596.1583956194&_r=1&z=385157673 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_gid=231333596.1583956194&gjid=644903928&_v=j81&z=385157673 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673&slf_rd=1&random=2685785150
Request Chain 68
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&aip=1&a=323611324&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ul=en-us&de=UTF-8&dt=Variant%20of%20Paradise%20Ransomware%20Targets%20Office%20IQY%20Files%20%7C%20Threatpost&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aEDAAUABC~&jid=1793700175&gjid=170851359&cid=1085220767.1583956194&tid=UA-35676203-21&_gid=231333596.1583956194&_r=1&gtm=2wg2q2PM29HLF&z=424762456 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_gid=231333596.1583956194&gjid=170851359&_v=j81&z=424762456 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456&slf_rd=1&random=2343899011
Request Chain 76
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
Request Chain 77
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
Request Chain 78
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
Request Chain 79
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
Request Chain 80
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
Request Chain 88
  • https://adrta.com/i?clid=pms&paid=pms&publisherId=19668&caid=&plid=&siteId=101281&kv1=300x250&kv2=threatpost.com&kv3=5e6940e2738a3&kv4=83.97.23.11&kv5=chrome&kv11=9268335745e6940e273fe0&kv12=101281&kv15=DE&kv16=&kv17=&kv18=&kv19=&kv24=desktop&kv26=macosx&kv27=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36 HTTP 302
  • https://ipds.adrta.com/i?__x=NHCQNCIKDGF@HBGLLHFGMMPEGMNFHLKHEBIKNHNMMFPMIIH@PIJILOGLILIKNPFFMKQBFLPIOJKIPJJKIALENHEKMOFLNKKKHIOIF@ILMJQKLFNMJHJCFAE@H&clid=pms&paid=pms&publisherId=19668&caid=&plid=&siteId=101281&kv1=300x250&kv2=threatpost.com&kv3=5e6940e2738a3&kv4=83.97.23.11&kv5=chrome&kv11=9268335745e6940e273fe0&kv12=101281&kv15=DE&kv16=&kv17=&kv18=&kv19=&kv24=desktop&kv26=macosx&kv27=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36
Request Chain 168
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si
Request Chain 199
  • https://sync.serverbid.com/ss/2000891.html HTTP 302
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Request Chain 200
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true
Request Chain 201
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent= HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true HTTP 302
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0?gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
Request Chain 207
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent= HTTP 302
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Request Chain 208
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent= HTTP 302
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Request Chain 211
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1 HTTP 302
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&verify=true HTTP 302
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
Request Chain 212
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D HTTP 302
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XmlA5wAAAFr23wXH HTTP 302
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XmlA5wAAAFr23wXH&_test=XmlA5wAAAFr23wXH
Request Chain 213
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1 HTTP 302
  • https://pixel.advertising.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b HTTP 302
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2

236 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Redirect Chain
  • https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-f=
  • https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
81 KB
21 KB
Document
General
Full URL
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
52a7ce04da9123f8fc33d9871e7c8841c73759b1c2a09476f467058fd21b5782
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
threatpost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Server
nginx
Date
Wed, 11 Mar 2020 19:49:53 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Link
<https://threatpost.com/wp-json/>; rel="https://api.w.org/" <https://threatpost.com/?p=153559>; rel=shortlink
X-Frame-Options
SAMEORIGIN
x-cache-hit
HIT
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Wed, 11 Mar 2020 19:49:53 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
close
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Expires
Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control
no-cache, must-revalidate, max-age=0, no-store
X-Redirect-By
WordPress
Location
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
X-Frame-Options
SAMEORIGIN
x-cache-hit
MISS
main.css
threatpost.com/wp-content/themes/threatpost-2018/assets/css/
234 KB
35 KB
Stylesheet
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
56ab0f61f8ed6030bdd684f3752233177da0555b07cb172e0abffe8e02978bc5

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:53 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:30 GMT
Server
nginx
ETag
W/"5e68c0d2-3a94d"
Transfer-Encoding
chunked
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:53 GMT
op.js
tagan.adlightning.com/math-aids-threatpost/
48 KB
14 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/op.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
53e0f389a55384a25e743fc0fbad4487fb201b3dac711351c6f29833c7272544

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:37:36 GMT
content-encoding
gzip
age
738
x-cache
Hit from cloudfront
status
200
content-length
13811
x-amz-meta-git_commit
0d4dfcb
last-modified
Wed, 11 Mar 2020 16:33:19 GMT
server
AmazonS3
etag
"db58f125a88fe232b8bdb13e91a0c632"
x-amz-version-id
ktXaJ6bi5V74aYuXnowq5G8IPbLlM2Qa
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=900
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
j01dDmCMqluyd35q5Nw6No6NonuHFD7PVTy6jkY3C02BIv76VUnggg==
ros-layout.js
qd.admetricspro.com/js/threatpost/
18 KB
2 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/ros-layout.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681b:9214 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c6f82014ed1bf97fc0ac74d2a0c213cad2d625e7195893ec8f5297a1f1a9b315

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 25 Feb 2020 17:18:38 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"4873-59f69adb865f0-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5727cd2209fcc2c2-FRA
expires
Wed, 11 Mar 2020 19:50:01 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a292c3af49568a498020caab16b2010f8dfad4ac19649094f6d9c85a206f9cd5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"453 / 874 of 1000 / last-modified: 1583781489"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14565
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:53 GMT
cmp.js
qd.admetricspro.com/js/threatpost/
218 KB
61 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/cmp.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681b:9214 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
aaf45a172ec90c76bcecd61c68d998c2256fe9b1700371e80011d1161c5ab629

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 27 Sep 2019 21:07:46 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"367ba-5938f47194c80-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5727cd220a03c2c2-FRA
expires
Wed, 11 Mar 2020 19:59:51 GMT
targeting.js
qd.admetricspro.com/js/threatpost/
275 B
234 B
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/targeting.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681b:9214 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6cdc57f82f4b0d09e5b4e584ca4736cd3871f20563d4ce25120b057d8ffb4eb2

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 08 Feb 2020 20:49:18 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"113-59e16a3cfb471-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5727cd220a05c2c2-FRA
expires
Wed, 11 Mar 2020 19:59:51 GMT
prebid.js
qd.admetricspro.com/js/threatpost/
294 KB
86 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/prebid.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681b:9214 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f40f7297122393e1425eec62e78a75c3211f7ad3f6b09a356aa317fcedc2cf3

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:53 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 26 Feb 2020 03:30:32 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"49929-59f723a0fd39e-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5727cd220a07c2c2-FRA
expires
Wed, 11 Mar 2020 19:49:58 GMT
engine.js
qd.admetricspro.com/js/threatpost/
16 KB
12 KB
Script
General
Full URL
https://qd.admetricspro.com/js/threatpost/engine.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3031::681b:9214 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bcf391dd0b006a87698ac0894d71039d610480913d24fcdaa1f2fdeeeda943e3

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:53 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sun, 24 Nov 2019 00:06:08 GMT
server
cloudflare
access-control-allow-origin
*
etag
W/"41f6-5980c69fe949d-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
5727cd220a08c2c2-FRA
expires
Wed, 11 Mar 2020 19:49:58 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
77 KB
17 KB
Stylesheet
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=15c28f13
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:fe00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2ed8662cb6ca4b48b146127db22ebd71f824d54fb6ca11601bd8fa97ff572cf2
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

date
Wed, 11 Mar 2020 10:44:49 GMT
content-encoding
gzip
age
32704
x-cache
Hit from cloudfront
status
200
content-length
16477
last-modified
Wed, 11 Mar 2020 10:43:31 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 58bcd6f2e1bc29fb83f080f1743cfeca.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
hg4fGyPxugG3csYX9VgbCynZg0JLVRc_xk-YGEJ0NF6y31qkcFLwSQ==
expires
Thu, 12 Mar 2020 10:44:49 GMT
jquery.js
threatpost.com/wp-includes/js/jquery/
95 KB
37 KB
Script
General
Full URL
https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:53 GMT
Content-Encoding
gzip
Last-Modified
Wed, 18 Dec 2019 22:32:15 GMT
Server
nginx
ETag
W/"5dfaa8ef-17a69"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:53 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
184 KB
58 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/google-analytics-dashboard-for-wp/assets/js/frontend.min.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert_text.js,wp-content/plugins/kaspersky-cookies-notification/scripts/alert.js,wp-content/plugins/honeypot-comments/public/assets/js/public.js,wp-content/plugins/kspr_twitter_pullquote/js/kaspersky-twitter-pullquote.js,wp-content/themes/threatpost-2018/assets/js/main.js,wp-content/themes/threatpost-2018/assets/js/loadmore.js,wp-content/plugins/kaspersky-social-sharing/assets/js/social-share.js&ver=15c28f13
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:fe00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
6646766f2dc5d27de89a7730d4eee6c643ae8d8fcd77b8cad10c833e648eac06
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 10:44:49 GMT
content-encoding
gzip
age
32704
x-cache
Hit from cloudfront
status
200
content-length
58403
last-modified
Wed, 11 Mar 2020 10:43:32 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 58bcd6f2e1bc29fb83f080f1743cfeca.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
dU9SS6nv3Em-htzCUvNiyQM7k8-Of45W2NMs20vdNnp70qAG_Ka4kQ==
expires
Thu, 12 Mar 2020 10:44:49 GMT
/
kasperskycontenthub.com/
0
338 B
Script
General
Full URL
https://kasperskycontenthub.com/?dm=ed1f9e435dc885292eab65620c51f3fb&action=load&blogid=103&siteid=1&t=2018274886&back=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Content-Type
application/javascript
x-cache-hit
HIT
Transfer-Encoding
chunked
Connection
close
X-XSS-Protection
1; mode=block
Ransomware.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/06/20122305/
175 KB
176 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/06/20122305/Ransomware.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
d7804060b04194259386a7ddb9f074c6046553f5353e69093b8a0e18aa1d005a

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sat, 07 Mar 2020 22:32:06 GMT
via
1.1 25ffb5a941b5a46b102cd385a9cdbb50.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Thu, 20 Jun 2019 16:23:06 GMT
server
AmazonS3
age
335868
etag
"50186cbd3e277f214c6286d691909475"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
179122
x-amz-cf-id
pkdAKGduGfMgS6tstJ_4j6U63uWDbUHmC3eTJ8NaoJag9ws3gYz_Hw==
expires
Fri, 19 Jun 2020 16:23:05 GMT
avatar_default.jpg
i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/
Redirect Chain
  • https://secure.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g
  • https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
65 B
65 B
Image
General
Full URL
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i0.wp.com
Software
nginx /
Resource Hash
3a90c56bbc2ea3fae7e089cc529bc02869c5035ee31c3111d829b9ae974cf42d

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
404
x-nc
HIT ams 8
date
Wed, 11 Mar 2020 19:49:53 GMT
server
nginx
content-type
text/html; charset=utf-8

Redirect headers

x-nc
HIT fra 3, BYPASS fra 4
date
Wed, 11 Mar 2020 19:49:53 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
source-age
5673238
location
https://i1.wp.com/kasperskycontenthub.com/wp-content/themes/kaspersky-root/assets/images/avatar_default.jpg?ssl=1
content-type
text/html; charset=utf-8
status
302
cache-control
max-age=300
link
<https://www.gravatar.com/avatar/fab896982b5c9974407bc14bd8b50b84?s=60&d=https%3A%2F%2Fkasperskycontenthub.com%2Fwp-content%2Fthemes%2Fkaspersky-root%2Fassets%2Fimages%2Favatar_default.jpg&r=g>; rel="canonical"
content-length
0
expires
Wed, 11 Mar 2020 19:54:53 GMT
subscribe2.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aa64fa30a3263fa3105736228a6feaaa4f7d32d8ef96b12e56f6fb95511b66a7

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sat, 15 Feb 2020 06:22:32 GMT
via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Tue, 19 Feb 2019 20:14:58 GMT
server
AmazonS3
age
2208442
etag
"5ba45563f793f39ef6baf02645651654"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
8281
x-amz-cf-id
2fa92r2LLtJXPm6j-CyC7fYnvF42vzLV1rL26LKOGsJTBPYKfFqd1Q==
expires
Wed, 19 Feb 2020 20:14:57 GMT
Malware-Generic-540x270.jpg
media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/
42 KB
42 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/03/11092825/Malware-Generic-540x270.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
799bc904c343ab04dbb361ac369a74d045cda6488fd06f0f475ee41effe7ee40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 15:35:13 GMT
via
1.1 dc81a30f5f4fc309ae9445723779b894.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Wed, 11 Mar 2020 13:28:29 GMT
server
AmazonS3
age
15282
etag
"4645a22426cc22cb37cb9bbf018608ee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1, FRA53-C1
accept-ranges
bytes
content-length
42907
x-amz-cf-id
xrETKPFD1zk2A-9fvIVAJHEv3sYzACeSJMdOUo7QZ4sEeqMYkmjQfg==
expires
Thu, 11 Mar 2021 13:28:28 GMT
iot-uk-law-540x270.jpeg
media.threatpost.com/wp-content/uploads/sites/103/2020/01/27084825/
46 KB
46 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/27084825/iot-uk-law-540x270.jpeg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3cedf3e0c5857028c85cc32c680685193777dec55c2766cd0a7801f748bb5a62

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Mon, 17 Feb 2020 05:54:50 GMT
via
1.1 62dc260e32d7b9197a4511447f6a264a.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Mon, 27 Jan 2020 13:48:28 GMT
server
AmazonS3
age
2037305
etag
"a34c482bfdf8a5da55f656dc3ed347ee"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
46643
x-amz-cf-id
FhyBr6oxs_oxGbVbWbdByUjJA1vEd9Jf2fRG8UOakGnugMBKbGkRUQ==
expires
Tue, 26 Jan 2021 13:48:25 GMT
botnet_700_420-540x270.png
media.threatpost.com/wp-content/uploads/sites/103/2019/12/24125234/
243 KB
243 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/12/24125234/botnet_700_420-540x270.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
99ddf47d1970efe8a4d4904940552998d1c426605609c87229f5314d6c29dde7

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 14 Feb 2020 04:07:09 GMT
via
1.1 62dc260e32d7b9197a4511447f6a264a.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Tue, 24 Dec 2019 17:52:38 GMT
server
AmazonS3
age
2302966
etag
"42616a662117c5099fc51a1578887065"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
248392
x-amz-cf-id
wNCXCumrlPDFQmVnsLNuTbKxzfvcPtIka86Au3MMMoRKztV45s040Q==
expires
Wed, 23 Dec 2020 17:52:34 GMT
api.js
www.google.com/recaptcha/
674 B
543 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?hl=en
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
240ce6bdfc10bbf98db30de7a2f930bf746ba86c04881e1a82568478f533b554
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:53 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
447
x-xss-protection
1; mode=block
expires
Wed, 11 Mar 2020 19:49:53 GMT
data-center-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/
8 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2020/01/15162631/data-center-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d36800d5a9c72e02424db4f2ee2d3e3391388e8b7e863533f73c788df14ab5e

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 15 Jan 2020 21:27:56 GMT
via
1.1 5a5b94c62ea85e0c0d78b169589b08b5.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Wed, 15 Jan 2020 21:26:52 GMT
server
AmazonS3
age
4832519
etag
"93668d327fc4fcc8e57177484d96236e"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C1, FRA53-C1
accept-ranges
bytes
content-length
8414
x-amz-cf-id
6TyZwmwwhCijPu4oYMOvbYd1Cy5AibEnG8_FB9RYvqfsW9ii_5SV6w==
expires
Thu, 14 Jan 2021 21:26:49 GMT
cyber-threat-2020-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2019/10/25090853/
3 KB
4 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/10/25090853/cyber-threat-2020-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e69b4aedd4ba4df00f7340e4a299dacca0abd06295d6c871f6816ea07db2507c

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 19 Feb 2020 01:19:23 GMT
via
1.1 1764af62d635a1a6ee51aabc37405452.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Fri, 25 Oct 2019 13:08:56 GMT
server
AmazonS3
age
1881032
etag
"97535062e07e5bd8bf0ddb185a9869c7"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
3569
x-amz-cf-id
JFQTF7Tfgv8eXZ-08DED3kZD_l4u04jdhNv5phlRvQF-n3PAv-FLBw==
expires
Sat, 24 Oct 2020 13:08:53 GMT
patches-64x64.png
media.threatpost.com/wp-content/uploads/sites/103/2017/05/06225026/
9 KB
9 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2017/05/06225026/patches-64x64.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b546be5b42d65b5d2eb3ef247886a1d692512462946bac11547df2a0a5ed02a2

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 18 Feb 2020 17:49:55 GMT
via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Tue, 03 Jul 2018 01:47:16 GMT
server
AmazonS3
age
1908000
etag
"34fd711c1863cbefe6bf897a5665a720"
x-cache
Hit from cloudfront
content-type
image/png
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
8748
x-amz-cf-id
JrzfWH-NrRxbj5dirhIjVz1Y6p_hkCuDDwpjA5iyz7x43pD9J32oPw==
expires
Wed, 03 Jul 2019 01:47:12 GMT
artificial_intelligence-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2018/10/01152243/
2 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2018/10/01152243/artificial_intelligence-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a968b405c5b4dcd85f76e5400c41930968710351102d83a80cf114ad7549b5d0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Sun, 16 Feb 2020 10:04:08 GMT
via
1.1 c90147ea5199ff7ce77981c8da4247c4.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Mon, 01 Oct 2018 19:22:48 GMT
server
AmazonS3
age
2108747
etag
"a67a437ee807847e498f42bfe1dd14fa"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1, FRA53-C1
accept-ranges
bytes
content-length
1834
x-amz-cf-id
sB9ao7D9FQN8t9V-srTYGDqI-1rGgRJc0MoaQr0PxIgISEwYT0ICgg==
expires
Tue, 01 Oct 2019 19:22:43 GMT
Hacker-64x64.jpg
media.threatpost.com/wp-content/uploads/sites/103/2019/01/23110846/
1 KB
2 KB
Image
General
Full URL
https://media.threatpost.com/wp-content/uploads/sites/103/2019/01/23110846/Hacker-64x64.jpg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:2a00:0:5c46:4f40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e3e05b274c76d548e39c6633af671d715bd1be28a929ab47a5ae8d29ff120df7

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 11 Feb 2020 19:05:59 GMT
via
1.1 21da0a66bafe2c8de8be4a4d8039346b.cloudfront.net (CloudFront), 1.1 f8895de4463e8d120a0f4b4a1f7703e4.cloudfront.net (CloudFront)
last-modified
Wed, 23 Jan 2019 16:08:49 GMT
server
AmazonS3
age
2508236
etag
"0c579c9f31a7fe9e5b94b47a6fd20620"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=31536000
x-amz-cf-pop
FRA6-C1, FRA53-C1
accept-ranges
bytes
content-length
1393
x-amz-cf-id
R1sT5OOIXJqHonkKb_LFWH6vvwokBEJ6-900itFX80o6h3LFb0s-fQ==
expires
Thu, 23 Jan 2020 16:08:46 GMT
liveView.php
live.sekindo.com/live/
24 KB
7 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
5eb1dab2ddd44843a3479622b3e3351c455bf15e079ecde1dcb0e5e8bc135239

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:53 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
2 KB
1 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-content/plugins/gravityforms/js/jquery.json.min.js&ver=15c28f13
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:fe00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
a9f6c03ce6f4d1654f29f2136651e883198d509cb2e26af1c24b1f87b6ccae13
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 10:44:49 GMT
content-encoding
gzip
age
32704
x-cache
Hit from cloudfront
status
200
content-length
935
last-modified
Wed, 11 Mar 2020 10:43:28 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 58bcd6f2e1bc29fb83f080f1743cfeca.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
NFl6Vq-hntV0FNa8BR-lyd7VDhiOqegCarc71C2vXBob2l2cO0M1RQ==
expires
Thu, 12 Mar 2020 10:44:49 GMT
gravityforms.min.js
threatpost.com/wp-content/plugins/gravityforms/js/
26 KB
10 KB
Script
General
Full URL
https://threatpost.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.2.6.5
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a783d2ad42c380bc896219c080fa845d1e9f2e77483558103aeb296b95b85701

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:57 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:28 GMT
Server
nginx
ETag
W/"5e68c0d0-6923"
Transfer-Encoding
chunked
Content-Type
application/x-javascript
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:57 GMT
/
assets.threatpost.com/wp-content/plugins/bwp-minify/min/
13 KB
5 KB
Script
General
Full URL
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/js/wp-embed.min.js,wp-content/plugins/gravityforms/js/conditional_logic.min.js,wp-content/plugins/gravityforms/js/placeholders.jquery.min.js,wp-content/plugins/akismet/_inc/form.js&ver=15c28f13
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:fe00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
8745d901441127f3d3ec1d97e1670be1803fb68102cee9274afc8c0381dcf9e3
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 10:44:49 GMT
content-encoding
gzip
age
32704
x-cache
Hit from cloudfront
status
200
content-length
4715
last-modified
Wed, 11 Mar 2020 10:43:28 GMT
server
nginx
cache-control
max-age=86400
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
via
1.1 58bcd6f2e1bc29fb83f080f1743cfeca.cloudfront.net (CloudFront)
x-cache-hit
MISS
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
_h5fO5o4TgR74C9IbJM86SLnHCOieaPFrmRHJVAC4hw_8Wt-tOGuCQ==
expires
Thu, 12 Mar 2020 10:44:49 GMT
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 28 Feb 2020 16:49:46 GMT
content-encoding
gzip
age
1047609
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
nrerxVMhR4Ww-PqLL2ROaVaY65XwRbPxzPbg3aqYxRTpDywDUlIVGQ==
bl-5b1e2be-e118df76.js
tagan.adlightning.com/math-aids-threatpost/
94 KB
37 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86348055f91f4ba094c23683b9c1be9b86edef1f988be0fb4107f4cb38dc7c40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 17:22:32 GMT
content-encoding
gzip
age
8843
x-cache
Hit from cloudfront
status
200
content-length
37002
x-amz-meta-git_commit
5b1e2be
last-modified
Wed, 11 Mar 2020 16:33:05 GMT
server
AmazonS3
etag
"c2585ec0377ca80cfb8820e0b034219d"
x-amz-version-id
ouOA4eoxwW8q2sfxYoaXQxo1FWpOS4rn
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
LkifLtIG1ruu2k32C755fzMP7YqI6cid68brrQUJeg2vRVK3YYBNDg==
pubads_impl_2020030501.js
securepubads.g.doubleclick.net/gpt/
165 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
8ee04e0441c9e51785d17ac835a93cf4d30d90826f87350b42ba233496a26f55
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61481
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:54 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
175 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
108
x-xss-protection
0
bid
ap.lijit.com/rtb/
47 B
723 B
XHR
General
Full URL
https://ap.lijit.com/rtb/bid?src=prebid_prebid_3.8.0
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.19 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx /
Resource Hash
025ffb33dc0fb6bdfe2a71ad2eed39eccc52082fc4563930f59a487e5a5a9bae

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Server
nginx
Vary
Accept-Encoding, User-Agent
Access-Control-Allow-Methods
GET, POST, DELETE, PUT
Content-Type
application/json
Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
X-Sovrn-Pod
ad_ap4ams1
Access-Control-Allow-Headers
X-Requested-With, Content-Type
Content-Length
65
prebid
ib.adnxs.com/ut/v3/
373 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.200 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
308.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
53c64974a7ebc9bce2126f6c2848978bfba935b73741cd2cba11a63d1338504f
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:56 GMT
X-Proxy-Origin
83.97.23.11; 83.97.23.11; 308.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.221.85:80
AN-X-Request-Uuid
7849c0d0-38d5-46cc-a13a-be59b9c9e9ea
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
373
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
v2
e.serverbid.com/api/
911 B
744 B
XHR
General
Full URL
https://e.serverbid.com/api/v2
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
165.227.252.242 North Bergen, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
/
Resource Hash
fc31235164285506e9bfbff1e3b514810a5908a36c2d6f254d580bc77778fe75

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
br
status
200
vary
Origin
content-type
application/json
access-control-allow-origin
https://threatpost.com
access-control-allow-credentials
true
content-length
467
translator
hbopenbid.pubmatic.com/
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 11 Mar 2020 19:49:54 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
prebid
ib.adnxs.com/ut/v3/
376 B
1 KB
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.200 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
308.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
58fb7f56724463f07f8f4ca4f454f538b893224c4fb023360f0140c116bbc9a1
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:56 GMT
X-Proxy-Origin
83.97.23.11; 83.97.23.11; 308.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.76:80
AN-X-Request-Uuid
9fa28c63-1521-434e-970e-06337a77415a
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
376
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

arj
teachingaids-d.openx.net/w/1.0/
0
0

cygnus
as-sec.casalemedia.com/
0
0

analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
7064
date
Wed, 11 Mar 2020 17:52:10 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
18174
expires
Wed, 11 Mar 2020 19:52:10 GMT
gtm.js
www.googletagmanager.com/
71 KB
24 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
2be33a914d0d4317bec62bfb913ac8ff2d553d82750df23fcbaf8396f9387b33
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
br
status
200
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24213
x-xss-protection
0
last-modified
Wed, 11 Mar 2020 19:01:39 GMT
server
Google Tag Manager
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 11 Mar 2020 19:49:54 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018//assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:57 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:31 GMT
Server
nginx
ETag
W/"5e68c0d3-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:57 GMT
icons.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/
11 KB
4 KB
Other
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/sprite/icons.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
76ba07e059d9e2113f9c940f1a31efc95bd9d5badd68bbc3637177e892a08099

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:57 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:31 GMT
Server
nginx
ETag
W/"5e68c0d3-2b9f"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:57 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/f1wAZV34wmOO4-wA3kszbUcM/
259 KB
93 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/f1wAZV34wmOO4-wA3kszbUcM/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?hl=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bb6150a376fda97ab4e1a31767faf4da7b0f5a4aa5a17750a4765d5fdad60e88
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Mon, 09 Mar 2020 17:11:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 09 Mar 2020 04:07:29 GMT
server
sffe
age
182325
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94728
x-xss-protection
0
expires
Tue, 09 Mar 2021 17:11:09 GMT
logo.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
19 KB
19 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
39af7c1116fb967a330e8770f775e6b5ee871add01ed45c98a1634911cebfb0a

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:50:09 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:32 GMT
Server
nginx
ETag
"5e68c0d4-4a32"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
18994
Expires
Wed, 18 Mar 2020 19:50:09 GMT
museosans-300-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
45ddc09b0ad6ab916bd9a0282070b161045e186fc025303f4aa1aa821fc45ac7

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:54 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:31 GMT
Server
nginx
ETag
"5e68c0d3-51b8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20920
Expires
Thu, 11 Mar 2021 19:49:54 GMT
museosans-700-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
ae00ae9c862bc8b8923efd1d9a18befa912678a869d4dd01179a59ed3de731be

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:54 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:31 GMT
Server
nginx
ETag
"5e68c0d3-51a4"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20900
Expires
Thu, 11 Mar 2021 19:49:54 GMT
museosans-100-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-100-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
06fc565587b8b700936a1677218cb269a6cc31ca5f701eb45461e86a3d54d5c7

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:55 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:32 GMT
Server
nginx
ETag
"5e68c0d4-50c8"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20680
Expires
Thu, 11 Mar 2021 19:49:55 GMT
museosans-500-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-500-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
2de77164bb9924542e1dea4ee4a0ff27d40b51a3d7939dac7db11a95045c9b7d

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:55 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:29 GMT
Server
nginx
ETag
"5e68c0d1-5194"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
20884
Expires
Thu, 11 Mar 2021 19:49:55 GMT
museosans-300italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
23 KB
23 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-300italic-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
f8a2b5b62eb722c3379b30cf0cc58d3176ee6be48036d6ad2aa838d2029c4189

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:55 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:29 GMT
Server
nginx
ETag
"5e68c0d1-5bac"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
23468
Expires
Thu, 11 Mar 2021 19:49:55 GMT
museosans-700italic-webfont.woff2
threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/
15 KB
16 KB
Font
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/fonts/museosans-700italic-webfont.woff2
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
859faa9b9ed0990288b2f393a102b1fe2668ac79088b113b6f0beaee521221eb

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:55 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:29 GMT
Server
nginx
ETag
"5e68c0d1-3dcc"
Content-Type
font/woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=31536000, public
Connection
close
Accept-Ranges
bytes
Content-Length
15820
Expires
Thu, 11 Mar 2021 19:49:55 GMT
mail-plane-light.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
828 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-light.svg
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
5a7ed822968963e31d88424c96387ad9f4fd4f4b5a5b581a33f65e3784d162cf

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:56 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:32 GMT
Server
nginx
ETag
W/"5e68c0d4-33c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:56 GMT
twitter-blue.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
868 B
847 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/twitter-blue.svg
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
420508fc523520f35de5c851905543294123d7676b5a5668744691f2abe9e730

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:29 GMT
Server
nginx
ETag
W/"5e68c0d1-364"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:49:55 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&a=323611324&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ul=en-us&de=U...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_gid=231333596.1583956194&gjid=644903928&_v=j81&z=385157673
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673&slf_rd=1&random=2685785150
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673&slf_rd=1&random=2685785150
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1322383547&_v=j81&z=385157673&slf_rd=1&random=2685785150
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
liveView.php
live.sekindo.com/live/ Frame 2593
3 KB
2 KB
Script
General
Full URL
https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
391041b642949933364133c9c96276c50d9864785280a02fe8e58b2e9b695f06

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/javascript; charset=utf-8
mail-plane-large-dark.svg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
812 B
722 B
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/mail-plane-large-dark.svg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
a9d2b2df99c1a115d5394c70a898d8801092208dc582f8bd6fb01b35c30d6b22

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:50:09 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11 Mar 2020 10:43:31 GMT
Server
nginx
ETag
W/"5e68c0d3-32c"
Transfer-Encoding
chunked
Content-Type
image/svg+xml
Cache-Control
max-age=604800, public
Connection
close
Expires
Wed, 18 Mar 2020 19:50:09 GMT
logo-white.png
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
10 KB
10 KB
Image
General
Full URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/logo-white.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.160.135 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-35-173-160-135.compute-1.amazonaws.com
Software
nginx /
Resource Hash
e4058d4ee9da1ceaddfa91ddb63650ba67285f1bbfee487d9dfe648bced669a0

Request headers

Referer
https://threatpost.com/wp-content/themes/threatpost-2018/assets/css/main.css?v=1583923411
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
public
Date
Wed, 11 Mar 2020 19:50:12 GMT
Last-Modified
Wed, 11 Mar 2020 10:43:29 GMT
Server
nginx
ETag
"5e68c0d1-260a"
Content-Type
image/png
Cache-Control
max-age=604800, public
Connection
close
Accept-Ranges
bytes
Content-Length
9738
Expires
Wed, 18 Mar 2020 19:50:12 GMT
quant.js
secure.quantserve.com/
13 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.146 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
e8d7c60749c1d62942a8e0a6f901800bd14ff3094251373626cd99a8875c6391
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Wed, 11-Mar-2020 19:49:54 GMT
Server
QS
Etag
M0-56c8c653
Vary
Accept-Encoding
Strict-Transport-Security
max-age=86400
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5651
Expires
Wed, 18 Mar 2020 19:49:54 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-PM29HLF
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.157 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:54 GMT
content-encoding
gzip
age
41731
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-fra19171-FRA
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1583956194.494661,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j81&aip=1&a=323611324&t=pageview&_s=1&dl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ul=en-u...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_gid=231333596.1583956194&gjid=170851359&_v=j81&z=424762456
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456&slf_rd=1&random=2343899011
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456&slf_rd=1&random=2343899011
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-35676203-21&cid=1085220767.1583956194&jid=1793700175&_v=j81&z=424762456&slf_rd=1&random=2343899011
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
DetectGDPR2.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 2593
8 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR2.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
ace61d80f3fe90bbb02ab328d9705b57a9c8a95d3a0bf6b4cd510d4dacd033df

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 18:48:12 GMT
Server
nginx
ETag
W/"5e2ddeec-211f"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Thu, 11 Mar 2021 19:49:54 GMT
iab_consent_sdk.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 2593
19 KB
6 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/iab_consent_sdk.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
a3336e3373c170b40764f5a62d121335bec4243b0034e561937194dfe2e413fd

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Wed, 12 Feb 2020 15:01:36 GMT
Server
nginx
ETag
W/"5e441350-4be0"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Thu, 11 Mar 2021 19:49:54 GMT
DetectGDPR.v1.0.js
live.sekindo.com/content/ClientDetections/ Frame 2593
7 KB
3 KB
Script
General
Full URL
https://live.sekindo.com/content/ClientDetections/DetectGDPR.v1.0.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
993ebc45d9927d420801f05819222e8cc1aa523187e4c0b290df02b23ce18093

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Sun, 26 Jan 2020 11:58:13 GMT
Server
nginx
ETag
W/"5e2d7ed5-1d87"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Thu, 11 Mar 2021 19:49:54 GMT
hls.0.12.4_1.min.js
live.sekindo.com/content/video/hls/ Frame 2593
247 KB
85 KB
Script
General
Full URL
https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
7d0492c66125b1c2bdc419641e41542857e7d90e323d355ee0b8bb268da121fb

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 Jan 2020 15:31:55 GMT
Server
nginx
ETag
W/"5e1352eb-3dcb9"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Thu, 11 Mar 2021 19:49:54 GMT
prebidVid.2.44.3_2.min.js
live.sekindo.com/content/prebid/ Frame 2593
267 KB
99 KB
Script
General
Full URL
https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
4ee36d77a67f176a8468c3fafd5c230a2b8584293b81221b004619e700f84106

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 Jan 2020 06:21:36 GMT
Server
nginx
ETag
W/"5e3275f0-42b3f"
Transfer-Encoding
chunked
Content-Type
application/javascript
Cache-Control
max-age=31536000, public
Expires
Thu, 11 Mar 2021 19:49:54 GMT
liveVideo.php
live.sekindo.com/live/ Frame 2593
350 KB
101 KB
Script
General
Full URL
https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveView.php?s=101281&cbuster=%%CACHEBUSTER%%&pubUrl=%%REFERRER_URL_ESC%%&x=[WIDTH]&y=[HEIGHT]&vp_content=plembed173akunvrojp&vp_template=6615&subId=[SUBID_ENCODED]&schain=1.0,1!admetricspro.com,1005,1&cbuster=1583956193&pubUrlAuto=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&videoType=flow&floatWidth=320&floatHeight=180&floatDirection=br&floatVerticalOffset=10&floatHorizontalOffset=10&floatCloseBtn=1&flowMode=undefined
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
0a3de7f86c81a60d09a51727ee79d5224e5943bad72b07718fa84aaaff67e4bf

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Content-Encoding
gzip
Server
nginx
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.133 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 19:49:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=0
content-length
65
x-xss-protection
0
x-response-time
118
pragma
no-cache
last-modified
Wed, 11 Mar 2020 19:49:57 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9ff35c157266cf85ed381f5065370611
x-transaction
002ddadb004b9120
expires
Tue, 31 Mar 1981 05:00:00 GMT
ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;cfp=1;rndc=1583956193;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=15...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
server
nginx
access-control-allow-origin
https://threatpost.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
rules-p-_7kVx0t9Jqj90.js
rules.quantcount.com/
3 B
357 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-_7kVx0t9Jqj90.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:214f:e000:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:46:15 GMT
via
1.1 73f3a23156999272233949c078c30859.cloudfront.net (CloudFront)
last-modified
Fri, 03 Mar 2017 23:52:35 GMT
server
AmazonS3
age
223
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Error from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=300
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
uvadTkkxvLTIINu0LwFtY04IKskXBnjciY59w8kWg7nI8wwEzuGnLg==
ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/
943 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166612/0/0/ADTECH;apid=1A7ac433ee-63d1-11ea-af29-12a93b07bf66;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=49a31e5db369bbc;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3e3c7f99104662d3bddb476cc50cdef8d69201a269da77d7b20f64da1c54b6d0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
943
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166617/0/0/ADTECH;apid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=50f0f8df4aa6db9;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
751453ce18a6141c6d4b18467dcbbc69815847801eec7c4240e27fbef65710c5

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166615/0/0/ADTECH;apid=1A7ac63ce8-63d1-11ea-b1a9-12e5e259ea22;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=48f6b5c5c99834c;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
f9c9fa16c29f74443fe212553f5fb9c6f393d81a6d583baeadeec1896b31816c

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:54 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166847/0/0/ADTECH;apid=1A7aee94d6-63d1-11ea-96a3-12bf237d14d4;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=478c1f78f2a1d79;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
784a2ed28c6f3269db7ef9819e4a9908efbde1fc4c51fc3abb214a42a2318a72

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/
945 B
1 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10927.1/5166606/0/0/ADTECH;apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0;cfp=1;rndc=1583956194;v=2;cmd=bid;cors=yes;alias=469e66ae449ee98;misc=1583956194290
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
db49d4312805c3dd503a7faffd62fee61a3fea4af0008516646e95cd9edad893

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://threatpost.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
application/json
content-length
945
expires
Mon, 15 Jun 1998 00:00:00 GMT
apstag.js
c.amazon-adsystem.com/aax2/ Frame 2593
87 KB
25 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-0-120.fra6.r.cloudfront.net
Software
Server /
Resource Hash
ac2a58f9d55c4642121cfb6f7e213cbc882bbdd75ef171ca8a07ed982ef693ce

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Tue, 10 Mar 2020 22:00:55 GMT
content-encoding
gzip
server
Server
age
78540
etag
1dcfbf3986ee8b9c3abbc67eb808ab43
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
x-amz-cf-id
qAX2Xh7W1tpB9pzcizw44--0kXfUIBDwXFxq2OefoZIaQUrhk5ZX4Q==
via
1.1 89c822bb1ce1445a7be6d1057088cfbf.cloudfront.net (CloudFront)
i
ipds.adrta.com/ Frame 2593
Redirect Chain
  • https://adrta.com/i?clid=pms&paid=pms&publisherId=19668&caid=&plid=&siteId=101281&kv1=300x250&kv2=threatpost.com&kv3=5e6940e2738a3&kv4=83.97.23.11&kv5=chrome&kv11=9268335745e6940e273fe0&kv12=101281...
  • https://ipds.adrta.com/i?__x=NHCQNCIKDGF@HBGLLHFGMMPEGMNFHLKHEBIKNHNMMFPMIIH@PIJILOGLILIKNPFFMKQBFLPIOJKIPJJKIALENHEKMOFLNKKKHIOIF@ILMJQKLFNMJHJCFAE@H&clid=pms&paid=pms&publisherId=19668&caid=&plid...
0
86 B
Image
General
Full URL
https://ipds.adrta.com/i?__x=NHCQNCIKDGF@HBGLLHFGMMPEGMNFHLKHEBIKNHNMMFPMIIH@PIJILOGLILIKNPFFMKQBFLPIOJKIPJJKIALENHEKMOFLNKKKHIOIF@ILMJQKLFNMJHJCFAE@H&clid=pms&paid=pms&publisherId=19668&caid=&plid=&siteId=101281&kv1=300x250&kv2=threatpost.com&kv3=5e6940e2738a3&kv4=83.97.23.11&kv5=chrome&kv11=9268335745e6940e273fe0&kv12=101281&kv15=DE&kv16=&kv17=&kv18=&kv19=&kv24=desktop&kv26=macosx&kv27=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.164.251.147 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-164-251-147.compute-1.amazonaws.com
Software
Apache/2.4.39 (Amazon) OpenSSL/1.0.2k-fips /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Wed, 11 Mar 2020 19:49:55 GMT
server
Apache/2.4.39 (Amazon) OpenSSL/1.0.2k-fips
content-length
0

Redirect headers

status
302
date
Wed, 11 Mar 2020 19:49:55 GMT
server
Apache/2.4.39 (Amazon) OpenSSL/1.0.2k-fips
content-length
0
location
https://ipds.adrta.com/i?__x=NHCQNCIKDGF@HBGLLHFGMMPEGMNFHLKHEBIKNHNMMFPMIIH@PIJILOGLILIKNPFFMKQBFLPIOJKIPJJKIALENHEKMOFLNKKKHIOIF@ILMJQKLFNMJHJCFAE@H&clid=pms&paid=pms&publisherId=19668&caid=&plid=&siteId=101281&kv1=300x250&kv2=threatpost.com&kv3=5e6940e2738a3&kv4=83.97.23.11&kv5=chrome&kv11=9268335745e6940e273fe0&kv12=101281&kv15=DE&kv16=&kv17=&kv18=&kv19=&kv24=desktop&kv26=macosx&kv27=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/ Frame 2593
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.0.120 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-0-120.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 11 Mar 2020 11:38:34 GMT
content-encoding
gzip
vary
Origin
age
29481
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 05 Mar 2020 08:28:46 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 7ff386cc5735ee5d428e6d9e2fdc8b2c.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA6-C1
x-amz-cf-id
zmcTkv_4OB21Xc5Cf_dird7M7KQDDq35aB5sPKD4jPTP8-ZPI1CBrw==
pixel;r=560053379;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F;fpan=1;fpa=P0-1586131435-1583956195121;ns=...
pixel.quantserve.com/
35 B
658 B
Image
General
Full URL
https://pixel.quantserve.com/pixel;r=560053379;source=gtm;rf=0;a=p-_7kVx0t9Jqj90;url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F;fpan=1;fpa=P0-1586131435-1583956195121;ns=0;ce=1;qjs=1;qv=0e9a7da-20191205140709;cm=;ref=;je=0;sr=1600x1200x24;enc=n;dst=1;et=1583956195121;tzo=-60;ogl=image.https%3A%2F%2Fmedia%252Ethreatpost%252Ecom%2Fwp-content%2Fuploads%2Fsites%2F103%2F2019%2F06%2F20122305%2FRanso%2Ctype.article%2Ctitle.Variant%20of%20Paradise%20Ransomware%20Targets%20Office%20IQY%20Files%2Cdescription.Threat%20actors%20can%20easily%20infiltrate%20networks%20because%20attacks%20evade%20detection%20by%20%2Curl.https%3A%2F%2Fthreatpost%252Ecom%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F1
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.169 , United Kingdom, ASN27281 (QUANTCAST, US),
Reverse DNS
Software
QS /
Resource Hash
a0d3a0aff7dc3bf32d2176fc3dcda6e7aba2867c4f4d1f7af6355d2cfc6c44f8
Security Headers
Name Value
Strict-Transport-Security max-age=86400

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Server
QS
Strict-Transport-Security
max-age=86400
P3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Cache-Control
private, no-cache, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
Fri, 04 Aug 1978 12:00:00 GMT
css
fonts.googleapis.com/ Frame 2545
2 KB
684 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 11 Mar 2020 19:49:55 GMT
server
ESF
date
Wed, 11 Mar 2020 19:49:55 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 11 Mar 2020 19:49:55 GMT
css
fonts.googleapis.com/ Frame 7F32
2 KB
638 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto&display=swap
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00d4fbacbadc6ecbd73be323ec77febf3d856ce00dc5334d06462a315c7da8e7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 11 Mar 2020 19:49:55 GMT
server
ESF
date
Wed, 11 Mar 2020 19:49:55 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 11 Mar 2020 19:49:55 GMT
placeHolder.png
live.sekindo.com/content/video/splayer/assets/
23 KB
24 KB
Image
General
Full URL
https://live.sekindo.com/content/video/splayer/assets/placeHolder.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx /
Resource Hash
76102878c1198de858725194952ba1c6b35bdee0f870cc6a124e93d17385e64e

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:55 GMT
Last-Modified
Sun, 11 Jun 2017 08:03:58 GMT
Server
nginx
ETag
"593cf96e-5dbf"
Content-Type
image/png
Cache-Control
no-cache, private
Accept-Ranges
bytes
Content-Length
23999
Expires
Wed, 11 Mar 2020 19:49:54 GMT
vid5e67fe2e6fa85901983510.jpg
video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
10 KB
11 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.jpg?cbuster=1583873591
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
d0e7614dd3397dd068c5c9a5b7aa74584f906099c962d66ae76f40fcf0cb00a6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:07 GMT
Server
Tengine
ETag
"5e67fe6f-29c4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
10692
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e67a17e8b3c1100247330.jpg
video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
13 KB
14 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e67a17e8b3c1100247330.jpg?cbuster=1583849868
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e2b81f17863fe79aefc02b3aa36acbc5a4d95f0c61d447eebbbc39a0eb93ee6a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 14:18:14 GMT
Server
Tengine
ETag
"5e67a1a6-3577"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
13687
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e66f59cc25cc273700263.jpg
video.sekindo.com/uploads/cn3/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
9 KB
9 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn3/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e66f59cc25cc273700263.jpg?cbuster=1583805868
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
0938fbca58fe4c162fb6e2dee8ee17dfa13c9b66a46a8c60fedeeb7f16847501
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 02:05:15 GMT
Server
Tengine
ETag
"5e66f5db-22d7"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
8919
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e621c1c098df193750674.jpg
video.sekindo.com/uploads/cn8/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
12 KB
13 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn8/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e621c1c098df193750674.jpg?cbuster=1583488036
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e4be5b94ae5d44559ee0e809b87774c6f6e3df1c523e6ab24e31977e965e76a8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Fri, 06 Mar 2020 09:48:08 GMT
Server
Tengine
ETag
"5e621c58-31c4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
12740
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e601c76e4399996024241.jpg
video.sekindo.com/uploads/cn4/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
19 KB
20 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e601c76e4399996024241.jpg?cbuster=1583357053
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
839a41ac8c4d0e8e71d0a3863e65fd68874108e81e71e814e2b863eaf866423d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Wed, 04 Mar 2020 21:25:10 GMT
Server
Tengine
ETag
"5e601cb6-4cb1"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
19633
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e62cf587202e612416470.jpg
video.sekindo.com/uploads/cn3/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
17 KB
18 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn3/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e62cf587202e612416470.jpg?cbuster=1583533918
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
ac651db2497b59ee56869b12cb336bb67c375c1c9e5f8b24b4d73e0c9d5c7521
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Fri, 06 Mar 2020 22:32:19 GMT
Server
Tengine
ETag
"5e62cf73-4574"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
17780
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e6120d0f1aa4526915999.jpg
video.sekindo.com/uploads/cn4/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
10 KB
11 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e6120d0f1aa4526915999.jpg?cbuster=1583423702
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
d0e7614dd3397dd068c5c9a5b7aa74584f906099c962d66ae76f40fcf0cb00a6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Thu, 05 Mar 2020 15:56:13 GMT
Server
Tengine
ETag
"5e61211d-29c4"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
10692
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e605d923856e944955747.jpg
video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/ Frame 7F32
20 KB
20 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn4/video/users/converted/24485/video1523972806/vid5e605d923856e944955747.jpg?cbuster=1583373717
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
708d5a5f75145cad4c36b2c44379e1f03d572c97032e1e723771c17eb833de6d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Thu, 05 Mar 2020 02:08:57 GMT
Server
Tengine
ETag
"5e605f39-4f4c"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
20300
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e67a175e6f80193428256.jpg
video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 7F32
14 KB
15 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e67a175e6f80193428256.jpg?cbuster=1583849852
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
2ca96ead8fc47853db84cc77e185134d554f75a5fcbe59323e65fb9c776c1369
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 14:18:11 GMT
Server
Tengine
ETag
"5e67a1a3-390b"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
14603
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e6311c00d236696657887.jpg
video.sekindo.com/uploads/cn8/video/users/converted/24485/video1523972806/ Frame 7F32
18 KB
18 KB
Image
General
Full URL
https://video.sekindo.com/uploads/cn8/video/users/converted/24485/video1523972806/vid5e6311c00d236696657887.jpg?cbuster=1583550915
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
5d104f50af9a46441c6350b3288f8957480825bfa779066915f5068cf019ee3d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Sat, 07 Mar 2020 03:16:29 GMT
Server
Tengine
ETag
"5e63120d-4819"
X-Cache-Status
HIT
Strict-Transport-Security
max-age=31536000
Content-Type
image/jpeg
Cache-Control
max-age=315360000
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
18457
Expires
Thu, 31 Dec 2037 23:55:55 GMT
vid5e67fe2e6fa85901983510.jpg
video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/ Frame 2545
0
0

truncated
/ Frame 2545
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 2545
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame 2593
80 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn6%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5e67fe2e6fa85901983510.mp4&vid_content_id=696116&vid_content_desc=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_title=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_duration=63&debugInformation=&x=400&y=225&fpl=2&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=52.51959991455078&geoLong=13.406900405883789&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&cbuster=1583956195315&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
7546a744646113a049518b1b1866489bd5424c7d717232b315ab4717e7554d5f

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3259
liveView.php
live.sekindo.com/live/ Frame 2593
80 KB
4 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=1&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn6%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5e67fe2e6fa85901983510.mp4&vid_content_id=696116&vid_content_desc=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_title=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_duration=63&debugInformation=&x=320&y=180&fpl=2&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=52.51959991455078&geoLong=13.406900405883789&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&cbuster=1583956195316&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
458b95632322d70e147563743bc6ca3ca378d2730f258fb3482e2314ab5629bf

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
3294
liveView.php
live.sekindo.com/live/ Frame 2593
33 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn6%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5e67fe2e6fa85901983510.mp4&vid_content_id=696116&vid_content_desc=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_title=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_duration=63&debugInformation=&x=400&y=225&fpl=2&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=52.51959991455078&geoLong=13.406900405883789&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&cbuster=1583956195317&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
2d35bfdba0bfdf5a8b1dc5ecdfcabb3b5921696170d7951a4a79a28901d4a8cc

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1992
liveView.php
live.sekindo.com/live/ Frame 2593
33 KB
2 KB
XHR
General
Full URL
https://live.sekindo.com/live/liveView.php?s=58057&vid_vastTimeout=-1&vid_vastType=3&vid_playerVer=3.0.0&vid_viewabilityState=0&vid_playbackMethod=auto&vid_content_url=https%3A%2F%2Fvideo.sekindo.com%2Fuploads%2Fcn6%2Fvideo%2Fusers%2Fconverted%2F28530%2Fvideo_5d5baf9fe4c32389620327%2Fvid5e67fe2e6fa85901983510.mp4&vid_content_id=696116&vid_content_desc=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_title=Amazon%27s+Ring+Video+Doorbell+3+product+page+leak&vid_content_duration=63&debugInformation=&x=320&y=180&fpl=2&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&isApp=0&geoLati=52.51959991455078&geoLong=13.406900405883789&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&cbuster=1583956195443&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/live/liveVideo.php?vpaidManager=sekindo&s=58057&ri=6C69766553746174737C736B317B54307D7B64323032302D30332D31315F32317D7B7331323334383830387D7B4335377D7B53644768795A5746306347397A6443356A6232303D7D7B626368726F6D657D7B716465736B746F707D7B6F6D61636F73787D7B583330307D7B593235307D7B66317D7B4C363631357DFEFE&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0+%28Macintosh%3B+Intel+Mac+OS+X+10_14_5%29+AppleWebKit%2F537.36+%28KHTML%2C+like+Gecko%29+Chrome%2F74.0.3729.169+Safari%2F537.36&playerVersion=3.0.0&fpl=-1&debugInformation=&isWePassGdpr=0&schain=1.0%2C1%21admetricspro.com%2C1005%2C1&csuuid=5e6940e2738a3&debugInfo=12348808_&debugPlayerSession=&sta=12348808&showLogo=0&clkUrl=&plMult=-1&schedule=eyJwcmVfcm9sbCI6MSwibWlkX3JvbGwiOltdLCJnYXAiOiJhdXRvIn0%3D&content=plembed173akunvrojp&secondaryContent=&x=300&y=250&pubUrl=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&contentNum=1&flow_closeBtn=1&flowCloseTimeout=0&flow_direction=br&flow_horizontalOffset=10&flow_bottomOffset=10&impGap=2&flow_width=320&flow_height=180&videoType=flow&gdpr=1&gdprConsent=&contentFeedId=&geoLati=52.51959991455078&geoLong=13.406900405883789&vpTemplate=6615&flowMode=both&isRealPreroll=0&playerApiId=&isApp=0&gdpr2Consent=&ccpa=0&ccpaConsent=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
ae08cc31203de7411e1d803e28b43d1ce3fd66014198954b24549f5ecdb0bb54

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store
Access-Control-Allow-Credentials
true
Content-Type
application/json; charset=utf-8
Content-Length
1989
chunklist_640.m3u8
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
454 B
854 B
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/chunklist_640.m3u8
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
73b725904ea1dbd6a1fff55ef89a0d3caa1d2c955d67f33234dfe3a3acc23210

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:41 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:35 GMT
Server
Tengine
ETag
"5e67fe8b-1c6"
Content-Type
application/vnd.apple.mpegurl
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:41 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
454
X-Proxy-Cache
HIT
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ Frame 2545
11 KB
11 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v20/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/css?family=Roboto&display=swap
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 27 Feb 2020 08:47:06 GMT
x-content-type-options
nosniff
last-modified
Wed, 24 Jul 2019 01:18:50 GMT
server
sffe
age
1162969
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
11016
x-xss-protection
0
expires
Fri, 26 Feb 2021 08:47:06 GMT
ads
securepubads.g.doubleclick.net/gampad/
63 KB
14 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2115129112305190&correlator=2341184246147708&output=ldjh&impl=fifs&adsid=NT&eid=21062797%2C21064170&vrg=2020030501&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200311&iu_parts=21707124336%2CThreatPost-970x250-ATF%2CThreatPost-300x250-ATF%2CThreatPost-300x600-ATF%2CThreatPost-2x2-Skin&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4&prev_iu_szs=728x90%7C970x250%7C970x90%2C300x250%7C336x280%2C300x250%7C300x600%2C2x2&eri=1&cust_params=urlhost%3Dhttps%253A%252F%252Fthreatpost.com%252F%26urlpath%3D%252Fvariant-of-paradise-ransomware-targets-office-iqy-files%252F153559%252F%26urlquery%3Dgoogfc%26contentid%3D153559%26category%3Duncategorized%26contenttags%3Dcyber-attacks%252Cencryption%252Cexcel%252Ciqy-files%252Clastline%252Cmalware%252Cmicrosoft-office%252Cparadise%252Cransomware%252Cthreat-actors&cookie_enabled=1&bc=31&abxe=1&lmt=1583956195&dt=1583956195542&dlt=1583956193526&idt=703&frm=20&biw=1585&bih=1200&oid=3&adxs=429%2C1075%2C1075%2C0&adys=10%2C257%2C1507%2C0&adks=1015519800%2C654286612%2C375389812%2C3385906655&ucis=1%7C2%7C3%7C4&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&dssz=43&icsg=176173059&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C300x250%7C300x250%7C1585x2&msz=728x90%7C300x250%7C300x250%7C1585x2&ga_vid=1085220767.1583956194&ga_sid=1583956196&ga_hid=323611324&fws=0%2C0%2C0%2C0&ohw=0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
4bdfecefe5a72313f3af7efd7ecfcaa06669f365b990421e89ef934347b1e357
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
13844
x-xss-protection
0
google-lineitem-id
5256160727,5192374023,-1,5283645110
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138298726560,138290277593,-1,138301519116
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://threatpost.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020030501.js
securepubads.g.doubleclick.net/gpt/
69 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020030501.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
sffe /
Resource Hash
ffdc18ac8f47bcd50dd9c33532c334e7073717a62b367d95b9cb1561048547dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 05 Mar 2020 14:08:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
25689
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:55 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

prebid
ib.adnxs.com/ut/v3/ Frame 2593
142 B
829 B
XHR
General
Full URL
https://ib.adnxs.com/ut/v3/prebid
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.200 , Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
308.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
83c5be1b4345839ea4cd58dd16dd3e3e9618807b97e139f34f739856557d910c
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:57 GMT
X-Proxy-Origin
83.97.23.11; 83.97.23.11; 308.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.221.44:80
AN-X-Request-Uuid
a1989634-f302-42ae-80d0-58803fd8a9f8
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://threatpost.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
142
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
translator
hbopenbid.pubmatic.com/ Frame 2593
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 11 Mar 2020 19:49:55 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
avjp
teachingaids-d.openx.net/v/1.0/ Frame 2593
92 B
473 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=a4f27b78-4697-4cf0-8c05-bf5d9f86326c&nocache=1583956195644&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882778&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 2593
141 B
361 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.158.0.61 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-158-0-61.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
fdd7002565f820e0b582b9d495b904812a3ca319c511f4e4ef9bca7854fd5256

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
148
expires
0
openrtb
ads.adaptv.advertising.com/rtb/ Frame 2593
0
0

cygnus
as-sec.casalemedia.com/ Frame 2593
0
0

w_640_000.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
351 KB
351 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_000.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
8efd74a21b1d43b7934aff633599670ef7398363f1181359544d5b1e402a95bb

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:41 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:30 GMT
Server
Tengine
ETag
"5e67fe86-57aa8"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:41 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
359080
X-Proxy-Cache
HIT
c1e4f574-7246-4a8e-960e-cf3d5b0aeea4
https://threatpost.com/ Frame 2593
63 KB
0
Other
General
Full URL
blob:https://threatpost.com/c1e4f574-7246-4a8e-960e-cf3d5b0aeea4
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e1c3c2dafe2208caea4f809f414a89a9d256deb8671e1c5d49bff9a873782796

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
worker

Response headers

Content-Length
64352
Content-Type
text/javascript
bl-5b1e2be-e118df76.js
tagan.adlightning.com/math-aids-threatpost/ Frame 90A1
94 KB
37 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86348055f91f4ba094c23683b9c1be9b86edef1f988be0fb4107f4cb38dc7c40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 17:22:32 GMT
content-encoding
gzip
age
8844
x-cache
Hit from cloudfront
status
200
content-length
37002
x-amz-meta-git_commit
5b1e2be
last-modified
Wed, 11 Mar 2020 16:33:05 GMT
server
AmazonS3
etag
"c2585ec0377ca80cfb8820e0b034219d"
x-amz-version-id
ouOA4eoxwW8q2sfxYoaXQxo1FWpOS4rn
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
JCiI0dW9MIHx7Ema3zksTlWrjyn7f2jelUs_z7sM-a41ccTiT40_Sg==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 90A1
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 28 Feb 2020 16:49:46 GMT
content-encoding
gzip
age
1047610
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Klqma7vntMuJvbqLZExB3lmv4M_fsDTWmFrUNEJs47JnYlpLc4QDoQ==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 90A1
106 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
dfe9a8e374cf98eca3bb030b298581e79bb4454b8a6a18629f9583cc6bc75c7e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
38505
x-xss-protection
0
server
cafe
etag
1537943626123226110
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 11 Mar 2020 19:49:55 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 90A1
73 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d2ccd5167c702b43d4c6dfc47eb2503d3717ca59de8380628c01b646583564a5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1583753690185738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28080
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:55 GMT
osd.js
www.googletagservices.com/activeview/js/current/
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bdab5a45cd656121670184c9dfb1375f4c34f0345ff3232c7ab1d4c4ff6e4ade
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1583753690185738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27566
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:55 GMT
bl-5b1e2be-e118df76.js
tagan.adlightning.com/math-aids-threatpost/ Frame 14F9
94 KB
37 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86348055f91f4ba094c23683b9c1be9b86edef1f988be0fb4107f4cb38dc7c40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 17:22:32 GMT
content-encoding
gzip
age
8844
x-cache
Hit from cloudfront
status
200
content-length
37002
x-amz-meta-git_commit
5b1e2be
last-modified
Wed, 11 Mar 2020 16:33:05 GMT
server
AmazonS3
etag
"c2585ec0377ca80cfb8820e0b034219d"
x-amz-version-id
ouOA4eoxwW8q2sfxYoaXQxo1FWpOS4rn
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
7gNZbPh66g-PCw8tZJw1BhVAoIENx3L4_Nfa29toDm8LTfWmtBdQYw==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 14F9
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 28 Feb 2020 16:49:46 GMT
content-encoding
gzip
age
1047610
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
loAk0sKBmd0FMuVJjTfHvlS059maDIdtw41aNyDoI4ueIStkMP4Gmg==
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/ Frame 14F9
106 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
dfe9a8e374cf98eca3bb030b298581e79bb4454b8a6a18629f9583cc6bc75c7e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
38505
x-xss-protection
0
server
cafe
etag
1537943626123226110
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Wed, 11 Mar 2020 19:49:55 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 14F9
73 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d2ccd5167c702b43d4c6dfc47eb2503d3717ca59de8380628c01b646583564a5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1583753690185738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28080
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:55 GMT
bl-5b1e2be-e118df76.js
tagan.adlightning.com/math-aids-threatpost/ Frame 380A
94 KB
37 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86348055f91f4ba094c23683b9c1be9b86edef1f988be0fb4107f4cb38dc7c40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 17:22:32 GMT
content-encoding
gzip
age
8845
x-cache
Hit from cloudfront
status
200
content-length
37002
x-amz-meta-git_commit
5b1e2be
last-modified
Wed, 11 Mar 2020 16:33:05 GMT
server
AmazonS3
etag
"c2585ec0377ca80cfb8820e0b034219d"
x-amz-version-id
ouOA4eoxwW8q2sfxYoaXQxo1FWpOS4rn
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
KYk6jAmPZge3TYz20UDtGx9Mrz7DMaM9X9k1Yv6ciOBQSeVKs2xZGw==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 380A
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 28 Feb 2020 16:49:46 GMT
content-encoding
gzip
age
1047611
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
hmXXRpdhdXE0RcS8BH9xXnmcAsLmeGjevYm73iS5emRHh83Lqp7xJg==
amp4ads-host-v0.js
cdn.ampproject.org/rtv/012002251816300/
20 KB
7 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/amp4ads-host-v0.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020030501.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8cebbfa1487e3dc67737bb93e04d96fef483b4b69cd67707d0cb4817e09a4335
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
7148
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"14121842040f9b16"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
bl-5b1e2be-e118df76.js
tagan.adlightning.com/math-aids-threatpost/ Frame 218E
94 KB
37 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/bl-5b1e2be-e118df76.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86348055f91f4ba094c23683b9c1be9b86edef1f988be0fb4107f4cb38dc7c40

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 17:22:32 GMT
content-encoding
gzip
age
8845
x-cache
Hit from cloudfront
status
200
content-length
37002
x-amz-meta-git_commit
5b1e2be
last-modified
Wed, 11 Mar 2020 16:33:05 GMT
server
AmazonS3
etag
"c2585ec0377ca80cfb8820e0b034219d"
x-amz-version-id
ouOA4eoxwW8q2sfxYoaXQxo1FWpOS4rn
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
FKT0HTD1PgXOcntF1z3QNOpATQ8kHJ_g9miYWEXVmwAmy9DRUf0d2w==
b-0d4dfcb.js
tagan.adlightning.com/math-aids-threatpost/ Frame 218E
53 KB
15 KB
Script
General
Full URL
https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.202.47 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-202-47.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
92236ba12e109fff1e82ecabec1eda229af59c8374c54374a38a46dc01f53559

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Fri, 28 Feb 2020 16:49:46 GMT
content-encoding
gzip
age
1047611
x-cache
Hit from cloudfront
status
200
content-length
14481
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 20 Jan 2020 21:00:33 GMT
server
AmazonS3
etag
"bf1a2a1d4ffb353d268fccfda0736572"
x-amz-version-id
PGsbLvp7r6PsyaqOJTHRTfOBKlgvnkI7
via
1.1 d16428714e022976873ccc980fdc1289.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA53-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
6kcvXH0qFTqHZMvywNpW_p51mKLAC1hsjtrbmWgo3IZzVHQDUYWqgg==
w_640_001.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
270 KB
270 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_001.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
3cea25fca3ad93f6dcb7dfd4a1391c657b2f9deaf4486fff8ac440d87c55b508

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:31 GMT
Server
Tengine
ETag
"5e67fe87-43788"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:42 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
276360
X-Proxy-Cache
HIT
view
securepubads.g.doubleclick.net/pcs/ Frame 90A1
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjst1szJy7a5L1CpI6SneSTMxzdAYhjHjfaKf1BdQSM_fMTiwsBmFtCZQ5bPJpzUXy1EwuMYykAlppPuatWX_rZEdqNWHiZmWgU_l5XWOZEfLQhyRQD1C6-vIev2l5mAWnVuux8KlPVpCnZHm3Kw1_cVSsvjwwfSPHulo5fKYy3k9vM1eytOenIMc2v0lsE7alDTTMTYn3iWUCNbV7TueUcbVGwsT41SvfrUauhrfv03GgwtSybIbxfp4IJ9LyH_q-orxzashaQJuM9OwvsMMsPXykC7N&sai=AMfl-YTIU78ngEviC7GsQb5QnxTh6H4Qi3px-Cgdx1oZPnrbJayj3J4g20ef-Ccyg8LFXTFP34CePqsToqYb4k3-ILjCtzeMC9HNeXi0r6Du&sig=Cg0ArKJSzDRPUTx9OaP2EAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Wed, 11 Mar 2020 19:49:56 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:56 GMT
truncated
/ Frame 90A1
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
883035b7447c9e4cdd51c51901438e82f3f1ea5754d1392e3e6959b0509ed147

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 14F9
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss3qLp2LfdtLTb3j0J6k_p7f9pxK7Px1xnfIi3ochYW04N4XTb-Ujeue7xfkLI5-1fNbdNUTl2E1xXhWzyC6Pkvked9TwHfhZBukYLbWTM198uzNBY-BhJ9_DYuxgC2oQ4buH5vIYbZszvpLiS8nSIYJFtcvNlmOSRMCxJliJYZX1CIFnFqCX55pQOFaKbeEa1kWiHf-mmUlkRUQcdNDwNtDU77G25lo-oyv89Wr_CO_f7ijuT5ZPnQH9WKxgH374B_FX3Jo67T8WLIijw0c749eLIW&sai=AMfl-YQIEdQGKArQy4dm8yA-qodAMz0MXCoLgJLm1pQx5js6phGLyxt78jQO5BbfWuCHkbljywBThNeRK4PijDZBZlmkGUSLOMHD0gY7xA3k&sig=Cg0ArKJSzIBc3AmrnPZ2EAE&urlfix=1&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
empty

Response headers

timing-allow-origin
*
date
Wed, 11 Mar 2020 19:49:56 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 14F9
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b2c08052a2c66cc938a7e080e94dbf5522edbf8fc2aba9d6868850d63f2804d7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.js
cdn.ampproject.org/rtv/012002251816300/ Frame 380A
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9a7e49fb41c1175f9d4e394b6fe993af1b657150e53115b86b7e410a4aad4985
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
Origin
https://threatpost.com
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55732
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"854d89fb2a05ebd2"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012002251816300/ Frame 380A
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9a7e49fb41c1175f9d4e394b6fe993af1b657150e53115b86b7e410a4aad4985
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55732
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"854d89fb2a05ebd2"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
amp-ad-exit-0.1.js
cdn.ampproject.org/rtv/012002251816300/v0/ Frame 380A
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/v0/amp-ad-exit-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
5b040cd620ed6482975472e60c4e67309a9375395a53aa7cba72489b76d61545
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5729
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"a6109f8e72088d21"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002251816300/v0/ Frame 380A
92 KB
28 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
dffd83700dd74d4524da45259085e0a134e06e87b4fe5b7fdf77134269da81ae
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17538
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28280
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:38 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"cc22e164f6b16c78"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:38 GMT
amp-fit-text-0.1.js
cdn.ampproject.org/rtv/012002251816300/v0/ Frame 380A
3 KB
1 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/v0/amp-fit-text-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2ef0229dbf3b245afa2fbd209ce7dba56323bcafc380f4ba46b112519bc94641
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17533
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1402
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:43 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"72fcdcddc4f213c3"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:43 GMT
amp-form-0.1.js
cdn.ampproject.org/rtv/012002251816300/v0/ Frame 380A
46 KB
15 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/v0/amp-form-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e57c9bc67a827ad246d31b9e24e71d6574e54c00e06e875a8aa83063fe50692d
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17512
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
14837
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:58:04 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"f3c2d481e0884561"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:58:04 GMT
18214743382600115427
tpc.googlesyndication.com/simgad/ Frame 380A
63 KB
63 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/18214743382600115427?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qmr06emOjTCUIYkFA8dlbjwatJOPw
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e90430e076a6c0aa15cff9e63081ae3b5503c048cf0f4f45fdcaf9f5e2763251
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Fri, 28 Feb 2020 14:49:00 GMT
x-content-type-options
nosniff
last-modified
Wed, 28 Aug 2019 15:57:30 GMT
server
sffe
age
1054856
content-type
image/png
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
64506
x-xss-protection
0
expires
Sat, 27 Feb 2021 14:49:00 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 380A
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 11:08:58 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
31258
etag
14819457070020093239
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2502
x-xss-protection
0
expires
Thu, 12 Mar 2020 11:08:58 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 380A
295 B
410 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 12:55:21 GMT
x-content-type-options
nosniff
content-type
image/png
server
cafe
age
24875
etag
426692510519060060
vary
Accept-Encoding
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=86400
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
295
x-xss-protection
0
expires
Thu, 12 Mar 2020 12:55:21 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 380A
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CbAnp40BpXvGQJdLc7gPY1q7IBvn0lpBcvLyiq9wJgZfc_P8WEAEg0YfSIGCV-vCBjAegAfiDkP4DyAEC4AIAqAMByAMIqgSVAk_Q61W-YB4CvS5R29jEhQ-gwlN1W9B4PnMNsJlk5WJoMPSIfryIgj0br6L20HM4Nwvx8BwIlUkVyom20vu1JpsyfIzWZzz8QAr8eXby_RCNXN2xJCLQOhx3IvEovrquP3MX-Fz7XvYhZWg6QSH6thZVQy3dAtROmHCtfj0ByBbj3SUeHLPkvDcHNkj7eOK1d_jM1M06C8nOwh0Hs65l7Ys12wEXrGdXQ3J6tUEhQfquv_Xx-NPAWxib-57zKGXNDhTBu8qD4k0vqvl0ovPUD9Sq69ONWxaMu1I4G4Q114oFjTrOXBW-TwqLSzUiaPKMQgsjvEbLFa9JWRin3X02IGdtA9_4DYtNaRiyYxNE1x_kpsozUkLABOL3i-mfAuAEAZIFBAgEGAGSBQQIBRgEoAYCgAfw--8BqAeOzhuoB9XJG6gHk9gbqAef2xuoB7oGqAfw2RuoB_LZG6gHpr4bqAfs1RvYBwHyBwQQ9boI0ggJCIDhgBAQARgd8ggbYWR4LXN1YnN5bi03MjYzNTczNDQ2ODA0MDc4gAoDyAsB2BMC&sigh=6inrWx6VRM8&tpd=AGWhJmsx4BDDx8yDojdQDj2sDWBGA7O7m5kZ_N85vjfTsEqGKg
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

truncated
/ Frame 380A
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
18d827eadb5fbffd74ca20f024eeee775ddb213cb145063e8531c7c4196db169

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=16&serverTime=1583956194&s=0&sta=12348808&x=320&y=180&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=696116&mediaPlayListId=5946&playerVer=3.0.0&contentMatchType=&isExcludeFromOpt=0&cbuster=1583956196222&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:55 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
amp4ads-v0.js
cdn.ampproject.org/rtv/012002251816300/ Frame 218E
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9a7e49fb41c1175f9d4e394b6fe993af1b657150e53115b86b7e410a4aad4985
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
script
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55732
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"854d89fb2a05ebd2"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
amp4ads-v0.js
cdn.ampproject.org/rtv/012002251816300/ Frame 218E
200 KB
55 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
9a7e49fb41c1175f9d4e394b6fe993af1b657150e53115b86b7e410a4aad4985
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17537
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
55732
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:39 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"854d89fb2a05ebd2"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:39 GMT
amp-analytics-0.1.js
cdn.ampproject.org/rtv/012002251816300/v0/ Frame 218E
92 KB
28 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012002251816300/v0/amp-analytics-0.1.js
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
dffd83700dd74d4524da45259085e0a134e06e87b4fe5b7fdf77134269da81ae
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/esm/ https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/mp/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sp/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp-collector.appspot.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
17538
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28280
x-xss-protection
0
server
sffe
date
Wed, 11 Mar 2020 14:57:38 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/javascript
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"cc22e164f6b16c78"
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 11 Mar 2021 14:57:38 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 218E
330 B
456 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 04 Feb 2020 01:13:14 GMT
x-content-type-options
nosniff
age
3177402
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 Feb 2021 01:13:14 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 218E
0
57 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjss1DGIQ4oLmWzZBsUPdC5r2nmBiYH5H-hInG-1F-hr7c4beaj3J762pn-MZvBytCWE2ZQSMr9bH72rJuAmlIrOgWmDF5W4KeCcIOFcnqPEzBrr7dzyVnD4ZwcSchUxc7MAe3GSrxn5ns2ucLfBYCllRfU0rLv2PIQFnlAAuT29w4RzbvCxdlUtze52R5MEzjbosbI0buh6Ul7ugnfr94CcTki1w_aOcFGVw2nuNNzFDOTKliqQHTS8z8ZUSGF010RBlCTY8cmY1LCl0GevpUA&sai=AMfl-YTZIzT_-fDoqB3TZjgANqGRFuhb1sTr_6ScdTYhMDDl-T975SSlGeo42cPzwBSUewCL92CTaUvtzfCqGOg01g647WI8vJXa75Hv08eq&sig=Cg0ArKJSzOXK2HvCmwEqEAE&adurl=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.98 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s18-in-f98.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
truncated
/ Frame 218E
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4637092abaab300e037696f050c3d4a35ae802621c9bcb10a43840f9e4636f04

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
integrator.js
adservice.google.de/adsid/ Frame 90A1
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 90A1
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/ Frame 90A1
222 KB
83 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7a94735f3a0e915a85bd8e216702c3146e1ffd2f6395276c8e5baee1249baaf1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
84919
x-xss-protection
0
server
cafe
etag
4312303881591303584
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 11 Mar 2020 19:49:56 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200305/r20190131/ Frame 235A
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200305/r20190131/zrt_lookup.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200305/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlTiv7jhPunhLhJo817DP40-eRsu6ylduNKJP8xY2SVUYkQKrflsT1EQRcn
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Fri, 06 Mar 2020 00:52:06 GMT
expires
Fri, 20 Mar 2020 00:52:06 GMT
content-type
text/html; charset=UTF-8
etag
10348540741379653356
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4494
x-xss-protection
0
cache-control
public, max-age=1209600
age
500270
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
integrator.js
adservice.google.de/adsid/ Frame 14F9
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 14F9
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=threatpost.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/ Frame 14F9
222 KB
83 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7a94735f3a0e915a85bd8e216702c3146e1ffd2f6395276c8e5baee1249baaf1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
84919
x-xss-protection
0
server
cafe
etag
4312303881591303584
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Wed, 11 Mar 2020 19:49:56 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 380A
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Redirect headers

date
Wed, 11 Mar 2020 19:49:56 GMT
x-content-type-options
nosniff
server
safe
location
https://googleads.g.doubleclick.net/pagead/drt/si
content-type
text/html; charset=UTF-8
status
302
cache-control
private
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
246
x-xss-protection
0
ads
googleads.g.doubleclick.net/pagead/ Frame BB06
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196270&bpp=23&bdt=307&fdt=249&idt=249&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=2&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=930991092&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=355678223&scr_x=0&scr_y=0&oid=2&pvsid=135294659603584&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.h3ua6qq30auc&fsb=1&dtd=264
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=90&slotname=5620800026&adk=2236077833&adf=3173046728&w=970&psa=0&guci=1.2.0.0.2.2.0.0&format=970x90&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196270&bpp=23&bdt=307&fdt=249&idt=249&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=2&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=930991092&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=308&ady=10&biw=1585&bih=1200&isw=970&ish=90&ifk=355678223&scr_x=0&scr_y=0&oid=2&pvsid=135294659603584&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C970%2C90&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.h3ua6qq30auc&fsb=1&dtd=264
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlTiv7jhPunhLhJo817DP40-eRsu6ylduNKJP8xY2SVUYkQKrflsT1EQRcn
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 11 Mar 2020 19:49:56 GMT
server
cafe
content-length
205
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 90A1
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bdab5a45cd656121670184c9dfb1375f4c34f0345ff3232c7ab1d4c4ff6e4ade
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1583753690185738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27566
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:56 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame C707
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196343&bpp=9&bdt=366&fdt=235&idt=235&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=1&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=606140387&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=1300267184&scr_x=0&scr_y=0&oid=3&pvsid=2491139162590456&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbdr1xk8owic&fsb=1&dtd=242
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-7500593236707325&output=html&h=250&slotname=7286959315&adk=2838937357&adf=3173046727&w=300&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1583956196343&bpp=9&bdt=366&fdt=235&idt=235&shv=r20200305&cbv=r20190131&ptt=9&saldr=aa&correlator=8329663197594&frm=23&ife=4&pv=1&ga_vid=1085220767.1583956194&ga_sid=1583956197&ga_hid=606140387&ga_fc=0&iag=3&icsg=8362&nhd=1&dssz=14&mdo=0&mso=0&u_tz=60&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1075&ady=257&biw=1585&bih=1200&isw=300&ish=250&ifk=1300267184&scr_x=0&scr_y=0&oid=3&pvsid=2491139162590456&rx=0&eae=2&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=20&bc=31&ifi=1&uci=1.xbdr1xk8owic&fsb=1&dtd=242
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUlTiv7jhPunhLhJo817DP40-eRsu6ylduNKJP8xY2SVUYkQKrflsT1EQRcn
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Wed, 11 Mar 2020 19:49:56 GMT
server
cafe
content-length
27904
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 14F9
73 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bdab5a45cd656121670184c9dfb1375f4c34f0345ff3232c7ab1d4c4ff6e4ade
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1583753690185738"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27566
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:56 GMT
7464639028652035684
tpc.googlesyndication.com/simgad/ Frame 218E
330 B
400 B
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7464639028652035684
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f19e7ee6cdf20bd478c037707c447b7cd469051de4dadeac32a795efb463c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Tue, 04 Feb 2020 01:13:14 GMT
x-content-type-options
nosniff
age
3177402
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
330
x-xss-protection
0
last-modified
Tue, 28 Jan 2020 23:02:00 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 03 Feb 2021 01:13:14 GMT
w_640_002.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
320 KB
320 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_002.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
a32b5602e43be6eb3974ae8e7461515f1b361746ad79eba5cac1bd93676782bd

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:31 GMT
Server
Tengine
ETag
"5e67fe87-50004"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:42 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
327684
X-Proxy-Cache
HIT
w_640_003.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
395 KB
395 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_003.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
e98c8596e0c199e8552b210d63dd5d097cab0e718f29c2f2742c439ce590122f

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:42 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:32 GMT
Server
Tengine
ETag
"5e67fe88-62ba4"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:42 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
404388
X-Proxy-Cache
HIT
sodar
pagead2.googlesyndication.com/getconfig/ Frame 90A1
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200305&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ab1e09a3cef26b0bdd8fd03f2ec8beb48e8f6aaa5608027858275941c6266b85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5211
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 90A1
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:49:56 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 944A
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 11 Mar 2020 19:09:31 GMT
expires
Thu, 11 Mar 2021 19:09:31 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2425
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
w_640_004.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
358 KB
358 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_004.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
cf5b99d9678413ff62ff2527dd7e60bf556cdf883f1317eddd828703f88dd2f6

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:43 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:32 GMT
Server
Tengine
ETag
"5e67fe88-5974c"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:43 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
366412
X-Proxy-Cache
HIT
w_640_005.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
291 KB
291 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_005.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
6de30759375feebbe1b2671f0a901124f752bebc67737e2deb2e5920813375b9

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:43 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:33 GMT
Server
Tengine
ETag
"5e67fe89-48b40"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:43 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
297792
X-Proxy-Cache
HIT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 90A1
0
69 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200305&jk=135294659603584&bg=!oaKlorpYfDibRfuciGkCAAAAYlIAAAARmQFgSV6Qy2bhKjgodJLqIf9SCOiR3Gpj_tZQFKu2IgzYyOAxS8fCTwOADY7_RA2vwHNX32izrElVOuJ0IrnYZTw8sJnFhk1ZYKCxGnrrxLFlHwOngGWYXzVQykWZRgxEpFsyzrSJcVtyeBwD3yRIOntRnXALgqb06qpb3CW5aLny-99ImIc1hw0dBrDvo1f_i-CHSc1DkQ7BD53vDLtdAX8vLjPot3wSiH4NGPKSNjBTNajoZqhkMyM7YgaEGHHJgxwTXpszdxoPCtaPSlM0BbJi20uhzn9y6zIgaGaptr8PEzJ7X2jgp7S_QaeC_Z8bIYCAndLpcxNavnggFYE75D51u4QU3FnrOzbohlW3ss8xKTuAooipBhIgar1hACliF3NEPKh4bd-N2knL7H9KKjdh8pMpahjc21p8ZyHDAVszcfM6-GPjdIZfL0_IZDfGp2WapxyBN1uh7bh0mjoglCEwIw
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:57 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
fontawesome-webfont.woff2
assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://assets.threatpost.com/wp-content/plugins/kaspersky-social-sharing/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:fe00:2:9275:3d40:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Referer
https://assets.threatpost.com/wp-content/plugins/bwp-minify/min/?f=wp-includes/css/dist/block-library/style.min.css,wp-content/plugins/wds-rss-builder/includes/css/select2.min.css,wp-content/plugins/wds-rss-builder/includes/css/wds-rss.css,wp-content/plugins/honeypot-comments/public/assets/css/public.css,wp-content/plugins/kspr_twitter_pullquote/css/style.css,wp-content/plugins/pullquote-shortcode/css/pullquote-shortcode.css,wp-content/plugins/kaspersky-social-sharing/assets/css/style.css,wp-content/plugins/kaspersky-social-sharing/assets/css/custom.css&ver=15c28f13
Origin
https://threatpost.com
Sec-Fetch-Dest
font
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 29 Sep 2019 03:41:07 GMT
via
1.1 b912dc97777020eb19579888add26978.cloudfront.net (CloudFront)
age
14227730
x-cache
Hit from cloudfront
status
200
content-length
77160
pragma
public
last-modified
Tue, 24 Sep 2019 11:58:41 GMT
server
nginx
etag
"5d8a04f1-12d68"
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000, public
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
x-amz-cf-id
kBjcvb2hArkWz-D4qyY1OVIT0PT-MxjskSuJeWjCLK3Wx4WudEkczA==
expires
Mon, 28 Sep 2020 03:41:07 GMT
photo-newsletter.jpg
threatpost.com/wp-content/themes/threatpost-2018/assets/images/
0
0

adsct
analytics.twitter.com/i/
31 B
652 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=ntt0j&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:49:57 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
57
x-xss-protection
0
x-response-time
114
pragma
no-cache
last-modified
Wed, 11 Mar 2020 19:49:57 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
9fecea598f756b15288aab6dd5896030
x-transaction
0098ad8e00d13dd9
expires
Tue, 31 Mar 1981 05:00:00 GMT
anchor
www.google.com/recaptcha/api2/ Frame F88E
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&theme=standard&size=normal&cb=v3kpkuq9hmlx
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-HLOqOkueagRW46I5bkFxYA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/anchor?ar=1&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&co=aHR0cHM6Ly90aHJlYXRwb3N0LmNvbTo0NDM.&hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&theme=standard&size=normal&cb=v3kpkuq9hmlx
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Wed, 11 Mar 2020 19:49:57 GMT
content-security-policy
script-src 'report-sample' 'nonce-HLOqOkueagRW46I5bkFxYA' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
10602
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
/
graph.facebook.com/
101 B
544 B
XHR
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
42cc3797ac4492044288b5b523411f364d1b1113ee8aee3543343a69dd700615
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
etag
"1552ab870ab5ba18a21b2f1679aa36d925db3b0e"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001822864
alt-svc
h3-27=":443"; ma=3600
content-length
101
pragma
no-cache
x-fb-debug
EaeL/ouvRQQVgnD7u/o1MJqVV/rF04FpJsKYp97YRjOq0iuCp1m52oGbxZ1DqKOmbTd7PwVaKrn177R8lzE0Fw==
x-fb-trace-id
DsG4+fvVYVP
date
Wed, 11 Mar 2020 19:49:57 GMT, Wed, 11 Mar 2020 19:49:57 GMT
content-type
application/json
access-control-allow-origin
*
x-fb-request-id
Ads7qlbLe2atOg_hwX9xB9Z
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.12
expires
Sat, 01 Jan 2000 00:00:00 GMT
share
www.linkedin.com/countserv/count/
0
0
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&format=jsonp&callback=jQuery112407804322622552502_1583956194310&_=1583956194311
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9101 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

info.json
www.reddit.com/api/
102 B
1 KB
XHR
General
Full URL
https://www.reddit.com/api/info.json?url=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F
Requested by
Host: threatpost.com
URL: https://threatpost.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.140 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
f4f2c0a4763f01ee2b13b4f8189e6fd5f32bd704d71fed8d0f11883de9724198
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 11 Mar 2020 19:49:57 GMT
via
1.1 varnish
x-content-type-options
nosniff
x-cache
MISS
status
200
content-length
102
x-xss-protection
1; mode=block
x-served-by
cache-fra19179-FRA
x-moose
majestic
expires
-1
server
snooserv
x-timer
S1583956197.271933,VS0,VE127
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=15552000; includeSubDomains; preload
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
X-Moose
cache-control
private, s-maxage=0, max-age=0, must-revalidate, no-store, max-age=0, must-revalidate
x-ua-compatible
IE=edge
accept-ranges
bytes
x-cache-hits
0
bframe
www.google.com/recaptcha/api2/ Frame BBFE
0
0
Document
General
Full URL
https://www.google.com/recaptcha/api2/bframe?hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=ixj6do7qebek
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-Yl0K3dL+jk7ZUi5LN51hyQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/recaptcha/api2/bframe?hl=en&v=f1wAZV34wmOO4-wA3kszbUcM&k=6Lfgf_8SAAAAADYbQAnKFOk7cvnWbkqo6y57-4-U&cb=ixj6do7qebek
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
content-type
text/html; charset=utf-8
cache-control
no-cache, no-store, max-age=0, must-revalidate
pragma
no-cache
expires
Mon, 01 Jan 1990 00:00:00 GMT
date
Wed, 11 Mar 2020 19:49:57 GMT
content-security-policy
script-src 'report-sample' 'nonce-Yl0K3dL+jk7ZUi5LN51hyQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
1181
server
GSE
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=36&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&cbuster=1583956197521&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:49:57 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
activeview
pagead2.googlesyndication.com/pcs/ Frame 218E
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssfSiHV-A8San3dRtayiqSx6eU-H366kywtKygGzSxQt3JAp_NHS_TA3MVzaYilaL6b7cvmyvFzKFxpVe2ikdCNWrXVXOQKedQeHtIRVqs&sig=Cg0ArKJSzHOe8gcsHrLREAE&id=ampim&o=0,0&d=2,2&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=191&tls=1192&g=100&h=100&tt=1192&r=v&adk=3385906655&avms=ampa
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:57 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 90A1
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsvQAmymTW8kFycrggIbaz4wSwRgIroqUq_qQni1sTCCYgVgG7g_kpDJTcgFHD1Z2wHokPHgxd0maAez9Gc7h4a47Rzn4D8bW9k7UP29K7Q&sig=Cg0ArKJSzOKjWuHn8OCqEAE&adk=1015519800&tt=-1&bs=1585%2C1200&mtos=1079,1079,1079,1079,1079&tos=1079,0,0,0,0&p=10,308,100,1278&gcm=1&lcs=1&mcvt=1079&rs=0&ht=0&tfs=520&tls=1599&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1583956195974&dlt&rpt=405&isd=0&msd=0&ext&xdi=0&msp=1&ps=1585%2C4643&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-14-9-13-13-0-0-0&tvt=1591&is=970%2C90&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&r=v&id=osdim&vs=4&uc=14&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200309
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:57 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 14F9
42 B
122 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstUMuU1nnM7s0Ngp9agOqxTnn7zk8ij9MFTE0YF03_0cuXMOP-4oSVx10j38uuxTpxon-ngvUFQ7qN9poA1kq4C3XWHBgebE0vVqqXUGU0&sig=Cg0ArKJSzL2KpWL6iVzAEAE&adk=654286612&tt=-1&bs=1585%2C1200&mtos=1081,1081,1081,1081,1081&tos=1081,0,0,0,0&p=257,1075,507,1375&gcm=1&lcs=1&mcvt=1081&rs=0&ht=0&tfs=519&tls=1600&mc=1&lte=0&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1583956195982&dlt&rpt=409&isd=0&msd=0&ext&xdi=0&msp=1&ps=1585%2C4643&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-14-4-13-13-0-0-0&tvt=1597&is=300%2C250&iframe_loc=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&r=v&id=osdim&vs=4&uc=14&upc=0&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200309
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:57 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
usync.html
eus.rubiconproject.com/ Frame E813
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.55.184 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-37-55-184.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 04 Mar 2020 22:48:14 GMT
Content-Encoding
gzip
Content-Length
7618
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=82866
Expires
Thu, 12 Mar 2020 18:51:04 GMT
Date
Wed, 11 Mar 2020 19:49:58 GMT
Connection
keep-alive
Vary
Accept-Encoding
showad.js
ads.pubmatic.com/AdServer/js/ Frame 452A
0
0
Document
General
Full URL
https://ads.pubmatic.com/AdServer/js/showad.js
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.32 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-32.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) /
Resource Hash

Request headers

Host
ads.pubmatic.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
KTPCACOOKIE=YES; KADUSERCOOKIE=D9F33FFA-0E6E-44FE-9754-73867B1E4046
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Last-Modified
Tue, 04 Feb 2020 05:12:07 GMT
ETag
"13006b6-9f85-59db914d12ccf"
Server
Apache/2.2.15 (CentOS)
Accept-Ranges
bytes
Content-Encoding
gzip
P3P
CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC", CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Length
14955
Content-Type
text/html; charset=UTF-8
Cache-Control
public, max-age=156204
Expires
Fri, 13 Mar 2020 15:13:22 GMT
Date
Wed, 11 Mar 2020 19:49:58 GMT
Connection
keep-alive
Vary
Accept-Encoding
async_usersync.html
acdn.adnxs.com/ib/static/usersync/v3/ Frame 5E14
0
0
Document
General
Full URL
https://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.17 , United States, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a72-247-225-17.deploy.static.akamaitechnologies.com
Software
nginx/1.9.13 /
Resource Hash

Request headers

Host
acdn.adnxs.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
icu=ChgIzLJhEAoYASABKAEw5IGl8wU4AUABSAEQ5IGl8wUYAA..; uuid2=4196024426691109671
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Last-Modified
Fri, 20 May 2016 02:07:09 GMT
ETag
"573e714d-3e3"
Server
nginx/1.9.13
Content-Type
text/html
Vary
Accept-Encoding
Access-Control-Allow-Origin
*
Content-Encoding
gzip
Content-Length
506
Cache-Control
max-age=31536000
Expires
Thu, 11 Mar 2021 19:49:58 GMT
Date
Wed, 11 Mar 2020 19:49:58 GMT
Connection
keep-alive
Cookie set beacon
ap.lijit.com/ Frame BDD5
0
0
Document
General
Full URL
https://ap.lijit.com/beacon?informer=13394437
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
216.52.2.19 , United States, ASN29791 (VOXEL-DOT-NET, US),
Reverse DNS
Software
nginx / raptor
Resource Hash

Request headers

Host
ap.lijit.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
ljtrtb=eJyrrgUAAXUA%2BQ%3D%3D; ljt_reader=5e90e71d5a523cdb55530650
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Server
nginx
Date
Wed, 11 Mar 2020 19:49:58 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Vary
Accept-Encoding
X-Application-Context
application:prod:9080
Expires
Fri, 20 Mar 2009 00:00:00 GMT
Set-Cookie
ljtrtbexp=eJxlkEEOgDAIBP%2FSsweg0IJfM%2F7dRE%2BMx6GZZek1dJwaGbpiVx7DOq7VeXbcsEMEExUYCFQsrKr9myQcZCR2JDITrdPBAUa%2Bwbfv3cUtXkbjCd%2FRx5HnhV%2BEH7xfeqP7ATyfWmg%3D;Path=/;Domain=.lijit.com;Expires=Thu, 11-Mar-2021 19:49:58 GMT;Max-Age=31536000;Secure;SameSite=None ljtrtb=eJyrrgUAAXUA%2BQ%3D%3D;Path=/;Domain=.lijit.com;Expires=Thu, 11-Mar-2021 19:49:58 GMT;Max-Age=31536000;Secure;SameSite=None ljt_reader=5e90e71d5a523cdb55530650;Path=/;Domain=.lijit.com;Expires=Thu, 11-Mar-2021 19:49:58 GMT;Max-Age=31536000;Secure;SameSite=None
Cache-Control
private, no-cache, no-store, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
Pragma
no-cache
P3P
CP="CUR ADM OUR NOR STA NID"
X-Powered-By
raptor
Content-Encoding
gzip
X-Sovrn-Pod
ad_ap4ams1
pd
u.openx.net/w/1.0/ Frame 632C
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=a18b135d-4409-0268-3527-066e93b3b979|1583956195
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=a18b135d-4409-0268-3527-066e93b3b979|1583956195; Version=1; Expires=Thu, 11-Mar-2021 19:49:58 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1583956198|mOgikimWiygu; Version=1; Expires=Thu, 26-Mar-2020 19:49:58 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Wed, 11 Mar 2020 19:49:58 GMT
content-type
text/html
content-length
375
content-encoding
gzip
via
1.1 google
alt-svc
clear
2000891.html
serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/ Frame 990A
Redirect Chain
  • https://sync.serverbid.com/ss/2000891.html
  • https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
0
0
Document
General
Full URL
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
Requested by
Host: qd.admetricspro.com
URL: https://qd.admetricspro.com/js/threatpost/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.42 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload

Request headers

Host
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Date
Wed, 11 Mar 2020 19:50:02 GMT
Connection
Keep-Alive
Accept-Ranges
bytes
Cache-Control
max-age=4295
Content-Length
4947
Content-Type
text/html
Last-Modified
Wed, 20 Nov 2019 20:29:05 GMT
ETag
"1b0ebac83fe30af80513039edbdf566f"
x-amz-request-id
tx00000000000001c8870c8-005e680031-340e0dc-nyc3a
Strict-Transport-Security
max-age=15552000; includeSubDomains; preload
Vary
Access-Control-Request-Headers,Access-Control-Request-Method,Origin
X-HW
1583956201.dop003.wa1.t,1583956202.cds008.wa1.shn,1583956202.dop003.wa1.t,1583956202.cds009.wa1.c

Redirect headers

status
302
content-length
0
location
https://serverbid-sync.nyc3.cdn.digitaloceanspaces.com/ss/2000891.html
cache-control
no-cache
sync
ups.analytics.yahoo.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:58 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

Date
Wed, 11 Mar 2020 19:49:58 GMT
Server
ATS/7.1.2.106
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Location
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=1TPV9tRmhvzNZNX8hmHOrYE326vNNNb8gWV4fzhv&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true
Connection
keep-alive
Content-Length
0
sync
ups.analytics.yahoo.com/ups/56465/
Redirect Chain
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0&verify=true
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0?gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:58 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Wed, 11 Mar 2020 19:49:58 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-IWGl83V1lxk5dDLqRykBmY6ERhrle9ZLJX4e&_origin=0&nsync=0&apid=1A7aeeb9c0-63d1-11ea-9df0-12bd5c3e34a0
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.212.184.249 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-212-184-249.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:58 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
current
aol-match.dotomi.com/match/bounce/
0
104 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1A7ac44bae-63d1-11ea-8d8c-12e650fea264&gdpr=1&gdpr_consent=&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:16::1370 , Sweden, ASN25751 (VALUECLICK, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
204
pragma
no-cache
date
Wed, 11 Mar 2020 19:49:58 GMT
cache-control
no-cache, private, max-age=0, no-store
server
nginx
expires
0
avjp
primis-d.openx.net/v/1.0/ Frame 2593
92 B
293 B
XHR
General
Full URL
https://primis-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=13eeede7-5ba2-4b05-913f-7524318cc4c1&nocache=1583956198654&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C!primis.tech%2C19668%2C1%2C%2C%2C&skip=1&auid=540392761&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:49:58 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
openrtb
ads.adaptv.advertising.com/rtb/ Frame 2593
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.103.169 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-103-169.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
translator
hbopenbid.pubmatic.com/ Frame 2593
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 11 Mar 2020 19:49:58 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
pd
u.openx.net/w/1.0/ Frame A07C
Redirect Chain
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=deb39d92-8b47-4d4e-b7ac-5fb8ba322911|1583956199
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=deb39d92-8b47-4d4e-b7ac-5fb8ba322911|1583956199; Version=1; Expires=Thu, 11-Mar-2021 19:49:59 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1583956199|mOgikimWiygu; Version=1; Expires=Thu, 26-Mar-2020 19:49:59 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Wed, 11 Mar 2020 19:49:59 GMT
content-type
text/html
content-length
373
content-encoding
gzip
via
1.1 google
alt-svc
clear

Redirect headers

status
302
set-cookie
i=deb39d92-8b47-4d4e-b7ac-5fb8ba322911|1583956199; Version=1; Expires=Thu, 11-Mar-2021 19:49:59 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
date
Wed, 11 Mar 2020 19:49:59 GMT
content-length
0
via
1.1 google
alt-svc
clear
pd
u.openx.net/w/1.0/ Frame 17C6
Redirect Chain
  • https://u.openx.net/w/1.0/pd?gdpr=1&gdpr_consent=
  • https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
0
0
Document
General
Full URL
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash

Request headers

:method
GET
:authority
u.openx.net
:scheme
https
:path
/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
i=0009c5d2-6bfe-428d-84c5-b9136c150e3a|1583956199
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
vary
Accept, Accept-Encoding
set-cookie
i=0009c5d2-6bfe-428d-84c5-b9136c150e3a|1583956199; Version=1; Expires=Thu, 11-Mar-2021 19:49:59 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None pd=v2|1583956199|mOgikimWiygu; Version=1; Expires=Thu, 26-Mar-2020 19:49:59 GMT; Max-Age=1296000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
date
Wed, 11 Mar 2020 19:49:59 GMT
content-type
text/html
content-length
373
content-encoding
gzip
via
1.1 google
alt-svc
clear

Redirect headers

status
302
set-cookie
i=0009c5d2-6bfe-428d-84c5-b9136c150e3a|1583956199; Version=1; Expires=Thu, 11-Mar-2021 19:49:59 GMT; Max-Age=31536000; Secure; Domain=.openx.net; Path=/; SameSite=None
server
OXGW/16.179.0
p3p
CP="CUR ADM OUR NOR STA NID"
location
https://u.openx.net/w/1.0/pd?cc=1&gdpr=1&gdpr_consent=
date
Wed, 11 Mar 2020 19:49:59 GMT
content-length
0
via
1.1 google
alt-svc
clear
usync.html
eus.rubiconproject.com/ Frame B3CF
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?gdpr=1&gdpr_consent=
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.37.55.184 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-37-55-184.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Wed, 04 Mar 2020 22:48:14 GMT
Content-Encoding
gzip
Content-Length
7619
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=82905
Expires
Thu, 12 Mar 2020 18:51:44 GMT
Date
Wed, 11 Mar 2020 19:49:59 GMT
Connection
keep-alive
Vary
Accept-Encoding
%7Bcombo_uid%7D
pr-bh.ybp.yahoo.com/sync/adaptv_ortb/ Frame 2593
43 B
563 B
Image
General
Full URL
https://pr-bh.ybp.yahoo.com/sync/adaptv_ortb/%7Bcombo_uid%7D
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:c305::8000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
48a33ca9f42b91902d57ad8ac52e1ce32b92c8c10c732f2dbb6fe960ebfd9438
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

date
Wed, 11 Mar 2020 19:49:59 GMT
referrer-policy
strict-origin-when-cross-origin
server
ATS
age
0
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=31536000
content-type
image/gif
status
200
x-content-type-options
nosniff
content-length
43
x-xss-protection
1; mode=block
expires
Thu, 01 Jan 1970 00:00:00 GMT
sync
ups.analytics.yahoo.com/ups/57304/ Frame 2593
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=adaptv_dbm&google_cm&google_sc
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1
  • https://pixel.advertising.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&verify=true
  • https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:59 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Wed, 11 Mar 2020 19:49:59 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/57304/sync?uid=CAESEAY9MJx5zpHow7dVt2NjotY&google_cver=1&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
sync
sync.adap.tv/ Frame 2593
Redirect Chain
  • https://sync-tm.everesttech.net/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D
  • https://sync-tm.everesttech.net/ct/upi/pid/m7y5t93k?redir=https%3A%2F%2Fsync.adap.tv%2Fsync%3Ftype%3Dgif%26key%3Dtubemogul%26uid%3D%24%7BUSER_ID%7D&_test=XmlA5wAAAFr23wXH
  • https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XmlA5wAAAFr23wXH&_test=XmlA5wAAAFr23wXH
0
0

sync
ups.analytics.yahoo.com/ups/55953/ Frame 2593
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=adaptv&ttd_tpi=1
  • https://pixel.advertising.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b
  • https://ups.analytics.yahoo.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b&apid=UP7dbb1a7f-63d1-11ea...
0
989 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
3.126.56.137 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-126-56-137.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:59 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Wed, 11 Mar 2020 19:49:59 GMT
strict-transport-security
max-age=31536000
content-length
0
location
https://ups.analytics.yahoo.com/ups/55953/sync?uid=0e41168e-c923-4d12-82d6-3285cdff3d6b&_origin=1&gdpr=1&gdpr_consent=&piggybackCookie=0e41168e-c923-4d12-82d6-3285cdff3d6b&apid=UP7dbb1a7f-63d1-11ea-8799-024004299ea2
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956200490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:00 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_006.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
273 KB
273 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_006.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
3e8231fcadac09a60769c47a42aaaf1ba37086cf1aa262919e044f37eb34605d

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:48 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:33 GMT
Server
Tengine
ETag
"5e67fe89-44404"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:48 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
279556
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1583956205277&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956205490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:08 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
w_640_007.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
276 KB
277 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_007.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
bea8292310d878f312e287e354fd4c02ac259ac9fa15b7e5c3ae7ded0dc899d3

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:49:54 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:34 GMT
Server
Tengine
ETag
"5e67fe8a-451f8"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:49:54 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
283128
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956210490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:10 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
sodar
pagead2.googlesyndication.com/getconfig/ Frame 14F9
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200305&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200305/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
76e3efa8909ed3cd329d1c4f1541162f3648794610809268f00945d9c96f736e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 11 Mar 2020 19:50:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5268
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 14F9
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
script

Response headers

date
Wed, 11 Mar 2020 19:50:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Wed, 11 Mar 2020 19:50:12 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame ABBC
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/math-aids-threatpost/b-0d4dfcb.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
iframe
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
iframe
Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Wed, 11 Mar 2020 19:09:31 GMT
expires
Thu, 11 Mar 2021 19:09:31 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
2441
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/ Frame 14F9
0
69 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gda_r20200305&jk=2491139162590456&bg=!bm2lbXVYm7im2gdMANoCAAAAXVIAAAARmQFgQMVKJvragWfzhEXuXGLib9flzY_JB6uA6yRvoKrPOrJ8Ir-_qNiK-NwXRkPQbs2F05dZWRmqwcPH_R9Z1O07Vjd4eShHTNV0QuIpp_3QojtYDUhZh1Q8qT3sU1UXyAOSQ6w1IrcWYUfuxWcAm_x9FFjXO3zraE-vMc-foxPHfOdOzTvpflkXOiArysjwwxqvoju-xMfMwI3A7iIoGbgIFns9FQ9dty_LS86QPLcLj3_O-xtdudCGNaL62do98sqUW1YGK0qwfJFox-ZyqGdAeCmRWV2jZiflp6Ky8yR09UsnbuxFsF5Yje16UuvvwMuHz-NIqatSXGHOI_5zh20kpVMtwUvZBP2Qf1naL7qmYHsml1MybI6yxQ_HywuNcxPavq33G6XKpan7SSku2RpPbVOMdXv6LTgYTvJWkS96r9zSrl1CmGoYjSXdBz9w9_vZjKqit8tBJ2O474qZK0xRdQ
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:50:12 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
translator
hbopenbid.pubmatic.com/ Frame 2593
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 11 Mar 2020 19:50:13 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 2593
141 B
360 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.158.0.61 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-158-0-61.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
20f975d2032aaf00dde23d0fffd9f008582923ccab006451d3b5d6b4239d0663

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:50:13 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://threatpost.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
147
expires
0
openrtb
ads.adaptv.advertising.com/rtb/ Frame 2593
0
215 B
XHR
General
Full URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.103.169 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-58-103-169.eu-central-1.compute.amazonaws.com
Software
adaptv/1.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

Access-Control-Allow-Origin
https://threatpost.com
Access-Control-Allow-Credentials
true
Server
adaptv/1.0
Connection
keep-alive
Content-Length
0
Content-Type
application/json
cygnus
as-sec.casalemedia.com/ Frame 2593
0
0

avjp
teachingaids-d.openx.net/v/1.0/ Frame 2593
92 B
292 B
XHR
General
Full URL
https://teachingaids-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=bd7e27fc-3d3f-4b41-9e67-23c1800ca90b&nocache=1583956213032&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&skip=1&auid=540882779&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:50:13 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
prebid
ib.adnxs.com/ut/v3/ Frame 2593
0
0

liveView.php
live.sekindo.com/live/ Frame 7F32
43 B
463 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=6&serverTime=1583956195&s=58057&sta=12604104&x=320&y=180&msta=12348808&vid_vastType=3&vid_viewabilityState=1&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&playbackMethod=auto&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&rvn=${VP_RVN_MACRO}&attemptMultiplier=10&contentFileId=0&mediaPlayListId=0&playerVer=3.0.0&cbuster=1583956213025&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
42b976597a2d977d0e300f6d06bc903db389e5c112d33c1c8c249690a522d9f2

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:15 GMT
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Content-Disposition
inline; filename="pixel.gif"
Content-Type
image/gif
Expires
Thu, 31 Dec 2037 23:55:55 GMT
w_640_008.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
292 KB
293 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_008.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
0e4bbf02e9c927677f58acedf203a2a267bd24c57e51a034a5742882552932db

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:50:00 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:34 GMT
Server
Tengine
ETag
"5e67fe8a-491dc"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:50:00 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
299484
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1583956215275&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:15 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956215490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:15 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
openrtb
ads.adaptv.advertising.com/rtb/ Frame 2593
0
0

translator
hbopenbid.pubmatic.com/ Frame 2593
0
59 B
XHR
General
Full URL
https://hbopenbid.pubmatic.com/translator?source=prebid-client
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
185.64.189.112 , United Kingdom, ASN62713 (AS-PUBMATIC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

status
204
date
Wed, 11 Mar 2020 19:50:16 GMT
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-origin
https://threatpost.com
avjp
primis-d.openx.net/v/1.0/ Frame 2593
92 B
293 B
XHR
General
Full URL
https://primis-d.openx.net/v/1.0/avjp?ju=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ch=UTF-8&res=1600x1200x24&ifr=true&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=a7a90176-0c14-440a-ad40-4317aa9f4e7e&nocache=1583956216033&gdpr_consent=&gdpr=1&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C!primis.tech%2C19668%2C1%2C%2C%2C&skip=1&auid=540392761&vwd=320&vht=180&
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/prebid/prebidVid.2.44.3_2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.120.147 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
147.120.95.34.bc.googleusercontent.com
Software
OXGW/16.179.0 /
Resource Hash
004e5faf0bf890f61697daeede9f21826affd1137fb2cb58eaf4719937a04a14

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Mar 2020 19:50:16 GMT
via
1.1 google
server
OXGW/16.179.0
status
200
p3p
CP="CUR ADM OUR NOR STA NID"
access-control-allow-origin
https://threatpost.com
cache-control
private, max-age=0, no-cache
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
content-length
92
expires
Mon, 26 Jul 1997 05:00:00 GMT
w_640_009.ts
video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/ Frame 2593
260 KB
260 KB
XHR
General
Full URL
https://video.sekindo.com/uploads/cn6/video/users/hls/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.mp4/w_640_009.ts
Requested by
Host: live.sekindo.com
URL: https://live.sekindo.com/content/video/hls/hls.0.12.4_1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
212.115.108.177 London, United Kingdom, ASN210329 (CLOUDWEBMANAGE-UK-1, GB),
Reverse DNS
Software
Tengine /
Resource Hash
a18e1d68461008567d8c92f9a948683ea247e81318e67cd508e5930cc2e9e6da

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Origin
https://threatpost.com
Sec-Fetch-Dest
empty
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 11 Mar 2020 19:50:06 GMT
Last-Modified
Tue, 10 Mar 2020 20:54:35 GMT
Server
Tengine
ETag
"5e67fe8b-40e68"
Content-Type
video/mp2t
Access-Control-Allow-Origin
*
Expires
Wed, 18 Mar 2020 19:50:06 GMT
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Keep-Alive
timeout=25
Content-Length
265832
X-Proxy-Cache
HIT
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956220490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:20 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=25&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=1000&cbuster=1583956225275&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:25 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8
liveView.php
live.sekindo.com/live/ Frame 7F32
0
379 B
Image
General
Full URL
https://live.sekindo.com/live/liveView.php?njs=1&ito=1&vid_event=42&serverTime=1583956194&s=101281&sta=0&x=300&y=250&vid_passDomain=threatpost.com&subId=threatpost.com&debugInformation=&userIpAddr=83.97.23.11&userUA=Mozilla%2F5.0%20%28Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F74.0.3729.169%20Safari%2F537.36&csuuid=5e6940e2738a3&contentFileId=0&mediaPlayListId=0&dur=500&cbuster=1583956225490&gdpr=1&gdprConsent=&isWePassGdpr=0&gdpr2Consent=&isWePassGdpr2=0&ccpa=0&ccpaConsent=
Requested by
Host: threatpost.com
URL: https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
194.146.38.23 -, , ASN41436 (CLOUDWEBMANAGE-EU, GB),
Reverse DNS
Software
nginx / PHP/7.3.14
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Pragma
no-cache
Date
Wed, 11 Mar 2020 19:50:25 GMT
Content-Encoding
gzip
Server
nginx
Age
0
X-Powered-By
PHP/7.3.14
Transfer-Encoding
chunked
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Access-Control-Allow-Origin
*
Cache-Control
no-store
Content-Type
text/html; charset=UTF-8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=2&alt_size_ids=55%2C57&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=fcb6cc70-7729-408b-bcf8-bbc4ba3d3ad2&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9940994594287986
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=16&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=c1118dc9-1a52-4636-b5c1-661b30e1365d&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.14708973985802642
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509506&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=95dc56e8-c86c-4f5e-abf3-841ee97bffe8&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.9145066969932751
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=19254&site_id=300372&zone_id=1509502&size_id=15&alt_size_ids=10&p_pos=atf&rp_schain=1.0,1!admetricspro.com,1005,1,,,&rf=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&tk_flint=pbjs_lite_v3.8.0&x_source.tid=95dc56e8-c86c-4f5e-abf3-841ee97bffe8&p_screen_res=1600x1200&rp_floor=0.01&rp_secure=1&slots=1&rand=0.4854684714182347
Domain
teachingaids-d.openx.net
URL
https://teachingaids-d.openx.net/w/1.0/arj?ju=https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F&ch=UTF-8&res=1600x1200x24&ifr=false&tz=-60&tws=1600x1200&be=1&bc=hb_pb_3.0.1&dddid=fcb6cc70-7729-408b-bcf8-bbc4ba3d3ad2%2Cfcb6cc70-7729-408b-bcf8-bbc4ba3d3ad2%2Cc1118dc9-1a52-4636-b5c1-661b30e1365d%2C95dc56e8-c86c-4f5e-abf3-841ee97bffe8%2C95dc56e8-c86c-4f5e-abf3-841ee97bffe8&nocache=1583956194294&schain=1.0%2C1!admetricspro.com%2C1005%2C1%2C%2C%2C&aus=728x90%2C970x250%2C970x90%7C728x90%2C970x250%2C970x90%7C300x250%2C336x280%7C300x250%2C300x600%7C300x250%2C300x600&divIds=div-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-2%2Cdiv-gpt-ad-6794670-3%2Cdiv-gpt-ad-6794670-5%2Cdiv-gpt-ad-6794670-5&auid=540932704%2C540932709%2C540932713%2C540932715%2C540932720&
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?s=438654&v=7.2&r=%7B%22id%22%3A%2241a1e94ea4a42a6%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22422de9067a7576d%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438654%22%2C%22sid%22%3A%22728x90%22%7D%2C%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%224341698adc111c5%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438649%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%2C%7B%22id%22%3A%2244d700c37700f3%22%2C%22ext%22%3A%7B%22siteID%22%3A%22438650%22%2C%22sid%22%3A%22300x250%22%7D%2C%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22source%22%3A%7B%22ext%22%3A%7B%22schain%22%3A%7B%22ver%22%3A%221.0%22%2C%22complete%22%3A1%2C%22nodes%22%3A%5B%7B%22asi%22%3A%22admetricspro.com%22%2C%22sid%22%3A%221005%22%2C%22hp%22%3A1%7D%5D%7D%7D%7D%7D&ac=j&sd=1&
Domain
video.sekindo.com
URL
https://video.sekindo.com/uploads/cn6/video/users/converted/28530/video_5d5baf9fe4c32389620327/vid5e67fe2e6fa85901983510.jpg?cbuster=1583873591
Domain
ads.adaptv.advertising.com
URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=TeachingAidsLLC
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r=%7B%22id%22%3A%2211b8e1f3b4a9d77%22%2C%22imp%22%3A%5B%7B%22id%22%3A%221273c38455a786e%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.46%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%2C%7B%22id%22%3A%2213433f11103a06f%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435871%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.46%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Domain
threatpost.com
URL
https://threatpost.com/wp-content/themes/threatpost-2018/assets/images/photo-newsletter.jpg
Domain
sync.adap.tv
URL
https://sync.adap.tv/sync?type=gif&key=tubemogul&uid=XmlA5wAAAFr23wXH&_test=XmlA5wAAAFr23wXH
Domain
as-sec.casalemedia.com
URL
https://as-sec.casalemedia.com/cygnus?s=435870&v=8.1&r=%7B%22id%22%3A%2229402243902fb9e%22%2C%22imp%22%3A%5B%7B%22id%22%3A%22302fabe9282ed21%22%2C%22ext%22%3A%7B%22siteID%22%3A%22435870%22%2C%22sid%22%3A%22320x180%22%7D%2C%22bidfloor%22%3A1.46%2C%22bidfloorcur%22%3A%22USD%22%2C%22video%22%3A%7B%22mimes%22%3A%5B%22video%2Fmp4%22%2C%22application%2Fjavascript%22%5D%2C%22minduration%22%3A1%2C%22maxduration%22%3A200%2C%22api%22%3A%5B1%2C2%5D%2C%22protocols%22%3A%5B1%2C2%2C3%2C4%2C5%2C6%5D%2C%22linearity%22%3A1%2C%22startdelay%22%3A0%2C%22skip%22%3A1%2C%22w%22%3A320%2C%22h%22%3A180%2C%22placement%22%3A1%7D%7D%5D%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fthreatpost.com%2Fvariant-of-paradise-ransomware-targets-office-iqy-files%2F153559%2F%22%7D%2C%22ext%22%3A%7B%22source%22%3A%22prebid%22%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%2C%22user%22%3A%7B%22ext%22%3A%7B%22consent%22%3A%22%22%7D%7D%7D&ac=j&sd=1&nf=1&
Domain
ib.adnxs.com
URL
https://ib.adnxs.com/ut/v3/prebid
Domain
ads.adaptv.advertising.com
URL
https://ads.adaptv.advertising.com/rtb/openrtb?ext_id=PrimisTwoHB

Verdicts & Comments Add Verdict or Comment

261 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate string| gAMP_urlhost string| gAMP_urlpath string| gAMP_urlquery string| gAMP_contentid string| gAMP_category string| gAMP_contenttags object| dT_0x3ec4 function| dT_0x495e object| xop function| 2pkv9xhkcg0 boolean| vjk7ey1xlog object| 69h0d6c17uo object| Ew_0x3c5c function| Ew_0x47dc function| xblocker object| Fx_0x2a24 function| Fx_0x34d8 function| xblacklist number| kPrebidTimeout number| kRefreshPollTime number| gRefreshCount number| gOXRefreshCount boolean| gRefreshDebug boolean| gPrebidDebug number| k60SecondRefreshInterval number| k90SecondRefreshInterval number| k120SecondRefreshInterval number| k180SecondRefreshInterval number| kDoNotRefresh number| kDefaultRefreshInterval object| gSChainNodes undefined| gGDPR_forceLocale boolean| gGDPR_silentNoConsent boolean| gGDPR_forceNoConsent string| gGDPR_logoURL undefined| kAmazonPublisherID object| ad728x90ATF object| ad300x250ATF object| ad300x250ATF2 object| ad728x90ATFTAB object| ad300x250ATFTAB object| ad300x250ATF2TAB object| ad320x50ATF object| ad300x250ATFM object| ad300x250ATF2M object| ad2x2skin number| gBrowserWidth object| desktopAdUnits object| tabletAdUnits object| mobileAdUnits object| gAllSlotData number| gAllSlotCount object| OX_dfp_ads number| minWidth boolean| disableBids object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt undefined| google_measure_js_timing object| __core-js_shared__ object| core undefined| __cmp function| pbjsChunk object| pbjs object| _pbjsGlobals object| gRefreshSlots object| gRefreshIDs object| gRefreshTimes object| gRefreshIntervals object| gThisRefreshIDs object| gThisRefreshSlots boolean| gInitialLoad object| gPBJSTimeoutTimer object| gAmazonSlots object| gAmazonBids boolean| gAmazonBidsBack boolean| gOpenXBidsBack boolean| gPrebidBidsBack function| amp_getBidsForAllChannels function| amp_dumpTable function| amp_getBestBids function| amp_dumpBids function| amp_dumpWins function| customOxTargeting function| openXRefreshCallback function| sendAdserverRequest function| checkIfAllBidsBack function| amazonBidsBack function| pbjsBidsBack function| bidsTimeout function| sendBidRequests function| amp_refreshAllSlots function| amp_refreshSlots function| refreshAdSlots function| injectReportAdStyles function| addLoadEvent function| insertAfter function| configureAdSlot function| getCookie string| em_version boolean| em_track_user string| em_no_track_reason string| disableStr function| __gaTrackerIsOptedOut function| __gaTrackerOptout function| gaOptout string| GoogleAnalyticsObject function| __gaTracker function| ga undefined| $ function| jQuery object| exactmetrics_frontend object| gdprDynamicStrings object| kss function| ExactMetrics object| ExactMetricsObject object| gdprStrings function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| dataLayer object| gf_global object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| viewPortSize object| debugIp object| debugId function| constructsekindoParent747 object| google_tag_manager object| recaptcha object| _qevents function| twq object| twttr function| quantserve function| __qc object| ezt object| _qoptions boolean| sekindoFlowingPlayerOn number| __google_ad_urls_id number| google_unique_id function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired object| __AMP_LOG object| __AMP_ERRORS boolean| ampInaboxInitialized object| __AMP_MODE function| __AMP_REPORT_ERROR object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager object| AMP object| google_reactive_ads_global_state function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| google_jobrunner object| google_ad_modifications number| google_global_correlator object| google_prev_clients function| gformBindFormatPricingFields function| Currency function| gformCleanNumber function| gformGetDecimalSeparator function| gformIsNumber function| gformIsNumeric function| gformDeleteUploadedFile function| gformIsHidden function| gformCalculateTotalPrice function| gformGetShippingPrice function| gformGetFieldId function| gformCalculateProductPrice function| gformGetProductQuantity function| gformIsProductSelected function| gformGetBasePrice function| gformFormatMoney function| gformFormatPricingField function| gformToNumber function| gformGetPriceDifference function| gformGetOptionLabel function| gformGetProductIds function| gformGetPrice function| gformRegisterPriceField function| gformInitPriceFields function| gformShowPasswordStrength function| gformPasswordStrength function| gformAddListItem function| gformDeleteListItem function| gformAdjustClasses function| gformToggleIcons function| gformMatchCard function| gformFindCardType function| gformToggleCreditCard function| gformInitChosenFields function| gformInitCurrencyFormatFields function| gformFormatNumber function| getMatchGroups function| gf_get_field_number_format function| renderRecaptcha function| gformValidateFileSize function| gformInitSpinner function| gformAddSpinner function| gf_raw_input_change function| gf_get_input_id_by_html_id function| gf_get_form_id_by_html_id function| gf_get_ids_by_html_id function| gf_input_change function| gformExtractFieldId function| gformExtractInputIndex function| rgars function| rgar object| _gformPriceFields undefined| _anyProductSelected function| GFCalc object| gform undefined| __gf_keyup_timeout object| gfMultiFileUploader function| gf_apply_rules function| gf_check_field_rule function| gf_apply_field_rule function| gf_get_field_action function| gf_is_match function| gf_is_match_checkable function| gf_is_match_default function| gf_format_number function| gf_try_convert_float function| gf_matches_operation function| gf_get_value function| gf_do_field_action function| gf_do_next_button_action function| gf_do_action function| gf_reset_to_default undefined| __gf_timeout_handle object| ak_js object| commentForm undefined| replyRowContainer undefined| children object| wp object| Placeholders object| jQuery112407804322622552502 object| gf_form_conditional_logic string| gf_number_format function| do_callback object| closure_lm_272515 function| jQuery112407804322622552502_1583956194310

0 Cookies

26 Console Messages

Source Level URL
Text
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 315)
Message:
gBrowserWidth =1600
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-970x250-ATF div-gpt-ad-6794670-2
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x250-ATF div-gpt-ad-6794670-3
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-300x600-ATF div-gpt-ad-6794670-5
console-api log URL: https://qd.admetricspro.com/js/threatpost/ros-layout.js(Line 340)
Message:
OpenX Slot defined for /21707124336/ThreatPost-2x2-Skin div-gpt-ad-6794670-1
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
CMP: Locale=en-us gdpr= false
console-api log URL: https://qd.admetricspro.com/js/threatpost/cmp.js(Line 3)
Message:
GDPR is not applicable, skipping initialization of CMP
console-api log (Line 3)
Message:
Not calling apstag.init() typeof(kAmazonPublisherID)=undefined
console-api log (Line 3)
Message:
ENGINE: gSChainNodes found, prebid configured with 1 supply chain object(s)
console-api log (Line 3)
Message:
Initial Ad Load
console-api log (Line 3)
Message:
sendBidRequests() gPBJSTimeoutTimer=null pbjs.adserverRequestSent=undefined
console-api log (Line 3)
Message:
pbjs bids returned
console-api log (Line 3)
Message:
gPBJSTimeoutTimer cleared
console-api log (Line 3)
Message:
sendAdserverRequest(): pbjsBidsBack
console-api log (Line 3)
Message:
sendAdserverRequest()
console-api log (Line 3)
Message:
Not calling apstag.setDisplayBids() gAmazonBidsBack=false
console-api log (Line 3)
Message:
pbjs.getAdserverTargeting: >> Prebid
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
pbjs.getBidResponses:
console-api log (Line 3)
Message:
[object Object]
console-api log (Line 3)
Message:
gThisRefreshSlots=
console-api log (Line 3)
Message:
[object Object],[object Object],[object Object],[object Object]
console-api log (Line 3)
Message:
sendAdserverRequest(): ---> Calling googletag.pubads().refresh()
console-api log (Line 3)
Message:
console.groupEnd
console-api info URL: https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js(Line 407)
Message:
Powered by AMP ⚡ HTML – Version 2002251816300 https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/
console-api info URL: https://cdn.ampproject.org/rtv/012002251816300/amp4ads-v0.js(Line 407)
Message:
Powered by AMP ⚡ HTML – Version 2002251816300 https://threatpost.com/variant-of-paradise-ransomware-targets-office-iqy-files/153559/

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

acdn.adnxs.com
adrta.com
ads.adaptv.advertising.com
ads.pubmatic.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
analytics.twitter.com
aol-match.dotomi.com
ap.lijit.com
as-sec.casalemedia.com
assets.threatpost.com
c.amazon-adsystem.com
cdn.ampproject.org
cm.g.doubleclick.net
e.serverbid.com
eus.rubiconproject.com
fastlane.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
hbopenbid.pubmatic.com
i1.wp.com
ib.adnxs.com
ipds.adrta.com
kasperskycontenthub.com
live.sekindo.com
match.adsrvr.org
media.threatpost.com
pagead2.googlesyndication.com
pixel.advertising.com
pixel.quantserve.com
pr-bh.ybp.yahoo.com
prebid-server.rubiconproject.com
primis-d.openx.net
qd.admetricspro.com
rules.quantcount.com
secure.gravatar.com
secure.quantserve.com
securepubads.g.doubleclick.net
serverbid-sync.nyc3.cdn.digitaloceanspaces.com
static.ads-twitter.com
stats.g.doubleclick.net
sync.adap.tv
sync.serverbid.com
t.co
tagan.adlightning.com
teachingaids-d.openx.net
threatpost.com
tpc.googlesyndication.com
u.openx.net
ups.analytics.yahoo.com
video.sekindo.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.linkedin.com
www.reddit.com
ads.adaptv.advertising.com
as-sec.casalemedia.com
fastlane.rubiconproject.com
ib.adnxs.com
sync.adap.tv
teachingaids-d.openx.net
threatpost.com
video.sekindo.com
104.244.42.131
104.244.42.133
143.204.202.47
151.101.12.157
151.101.13.140
152.199.22.24
165.227.252.242
172.217.22.66
172.217.22.98
185.33.223.200
185.64.189.112
192.0.77.2
194.146.38.23
205.185.216.42
212.115.108.177
216.52.2.19
23.37.55.184
2600:9000:214f:2a00:0:5c46:4f40:93a1
2600:9000:214f:e000:6:44e3:f8c0:93a1
2600:9000:2156:fe00:2:9275:3d40:93a1
2606:4700:3031::681b:9214
2a00:1288:110:c305::8000
2a00:1450:4001:800::2002
2a00:1450:4001:808::2003
2a00:1450:4001:80b::200a
2a00:1450:4001:814::2003
2a00:1450:4001:816::2002
2a00:1450:4001:817::200e
2a00:1450:4001:819::2002
2a00:1450:4001:81a::2001
2a00:1450:4001:81b::2001
2a00:1450:4001:81d::2008
2a00:1450:4001:81e::2004
2a00:1450:4001:820::2003
2a00:1450:4001:824::2002
2a00:1450:400c:c00::9d
2a02:fa8:8806:16::1370
2a03:2880:f01c:800e:face:b00c:0:2
2a04:fa87:fffe::c000:4902
2a05:f500:10:101::b93f:9101
3.126.56.137
34.95.120.147
35.158.0.61
35.173.160.135
52.212.184.249
52.28.46.116
52.58.103.169
54.164.251.147
72.247.225.17
72.247.225.32
91.228.74.146
91.228.74.169
99.86.0.120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