yhngf.frewdsjcvykiyiktjl.cf Open in urlscan Pro
142.4.3.120  Malicious Activity! Public Scan

URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&br...
Submission: On January 16 via manual from TW

Summary

This website contacted 7 IPs in 2 countries across 6 domains to perform 1113 HTTP transactions. The main IP is 142.4.3.120, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is yhngf.frewdsjcvykiyiktjl.cf.
This is the only time yhngf.frewdsjcvykiyiktjl.cf was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) Tech Support Scam (Consumer)

Domain & IP information

IP Address AS Autonomous System
6 1097 142.4.3.120 46606 (UNIFIEDLA...)
1 209.197.3.24 20446 (HIGHWINDS3)
6 2606:4700:10:... 13335 (CLOUDFLAR...)
4 2a00:1450:400... 15169 (GOOGLE)
3 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1113 7
Domain Requested by
1097 yhngf.frewdsjcvykiyiktjl.cf 6 redirects yhngf.frewdsjcvykiyiktjl.cf
4 fonts.googleapis.com embed.tawk.to
3 vs82.tawk.to embed.tawk.to
3 cdn.jsdelivr.net embed.tawk.to
yhngf.frewdsjcvykiyiktjl.cf
2 va.tawk.to embed.tawk.to
1 fonts.gstatic.com embed.tawk.to
1 embed.tawk.to yhngf.frewdsjcvykiyiktjl.cf
1 code.jquery.com yhngf.frewdsjcvykiyiktjl.cf
1113 8

This site contains no links.

Subject Issuer Validity Valid
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
ssl902639.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-15 -
2020-05-23
6 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-20 -
2020-03-13
3 months crt.sh
ssl363648.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-14 -
2020-03-22
6 months crt.sh
*.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh

This page contains 13 frames:

Primary Page: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Frame ID: 8506AB87DD9ADB4139C330B86B506E33
Requests: 15 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 49C250ABFD1BE0F9319219C27A3F6ED6
Requests: 157 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 839EFF2AC7E0B44A7C6EB3A2CE5E4FC1
Requests: 155 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 849838DCCBC56B8280FF95998043D7DA
Requests: 153 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 4089ADF2D45AC97AA5E411101632FC57
Requests: 158 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 88541B00136FD9E2DE2A7F11F97E58D2
Requests: 155 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: 93CB7D23FC77D966852E603F4837649B
Requests: 154 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Frame ID: C06B7F129A90475D6F944251A95B8862
Requests: 157 HTTP requests in this frame

Frame: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/beep.mp3
Frame ID: DE6DF75600835DBE43DB9EC614AA1870
Requests: 2 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Frame ID: D9DDADA21C3EB740DDDCCC280FF48844
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Frame ID: 5B875C4200E1BF9AE03EC9B245A216E5
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Frame ID: B66142CF3F0D3D4D79AC608BCA9446FF
Requests: 2 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Frame ID: 6B2C238EBBC724B5A676E8CA25F45947
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /\/\/embed\.tawk\.to/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

1113
Requests

1 %
HTTPS

67 %
IPv6

6
Domains

8
Subdomains

7
IPs

2
Countries

1177 kB
Transfer

1273 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 95
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Request Chain 337
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Request Chain 517
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Request Chain 652
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Request Chain 853
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Request Chain 928
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php HTTP 302
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

1113 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
10 KB
10 KB
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
f4db21747f169407c55cef37fc8b5af62bb93e922573276d23614947c6bbe94a

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Server
Apache
Last-Modified
Wed, 15 Jan 2020 21:46:18 GMT
Accept-Ranges
bytes
Content-Length
10017
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
style.min.css
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
4 KB
5 KB
Stylesheet
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/style.min.css
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
4a74d6b33324b196502c0736ad5237f9f4a4fe1707aee8f7c916d3828a1ccca5

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Last-Modified
Sat, 19 Jan 2019 12:42:24 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4563
index.css
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
2 KB
2 KB
Stylesheet
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/index.css
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
6cccd74e4ec557ccb5e871c718ddb70b5a39b42b0d489399fee95423af5b30fb

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Last-Modified
Sat, 19 Jan 2019 12:42:20 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1986
header-bar3.png
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
14 KB
14 KB
Image
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/header-bar3.png
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
935d308a79350b7db9582d8f94bcf43d06476756c38769b8f2834a8e661d53c5

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Last-Modified
Sat, 19 Jan 2019 12:42:14 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
14263
micro-logo.png
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
4 KB
4 KB
Image
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/micro-logo.png
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
112fec798b78aa02e102a724b5cb1990c0f909bc1d8b7b1fa256eab41bbc0960

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Last-Modified
Sat, 19 Jan 2019 12:42:04 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4054
jquery-1.11.1.min.js
code.jquery.com/
94 KB
33 KB
Script
General
Full URL
https://code.jquery.com/jquery-1.11.1.min.js
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
209.197.3.24 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip0x018.map2.ssl.hwcdn.net
Software
nginx /
Resource Hash
540bc6dec1dd4b92ea4d3fb903f69eabf6d919afd48f4e312b163c28cff0f441

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 00:55:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:07 GMT
Server
nginx
ETag
W/"54499a47-1762a"
Vary
Accept-Encoding
X-HW
1579136106.dop005.am5.shc,1579136106.dop005.am5.t,1579136106.cds119.am5.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33202
default
embed.tawk.to/54ab9861f7d9f97ff8e285d3/
501 KB
110 KB
Script
General
Full URL
https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7091c005f81c6f7057b650b7f01e60a2248b7ff93befb5d332018542724d014f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf

Response headers

date
Thu, 16 Jan 2020 00:55:07 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
MISS
server
cloudflare
access-control-allow-origin
*
etag
W/"fulls6812"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
public, max-age=14400, s-maxage=3600
strict-transport-security
max-age=0; includeSubDomains; preload
cf-ray
555c1f3aacbcdfc7-FRA
truncated
/
239 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bd08b9849632e73574f62ca80572a17f9bbd9bb1010fe8c6380e641460abd96c

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=f304e5cf0iiuo1pqof5hor34s5; path=/
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=ubfm2v5aaqq5pu491bob9ft4g1; path=/
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=ujihmn2b1bb7v90kh956h3in45; path=/
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=7ph0t7d7r3q6j6u43301cvmn47; path=/
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
747 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=94e6rbusqbrgmifi0sn13gnu77; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
747 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=tg871llec8nc9uaq84ilaq0s34; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; path=/
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
beep.mp3
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame DE6D
0
0
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/beep.mp3
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Last-Modified
Wed, 28 Feb 2018 14:07:56 GMT
Accept-Ranges
bytes
Content-Length
8405
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
audio/mpeg
beep.mp3
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
8 KB
8 KB
Media
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/beep.mp3
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
0589be7715d2320e559eae6bd26f3528e97450c70293da2e1e8ce45f77f99ab1

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Last-Modified
Wed, 28 Feb 2018 14:07:56 GMT
Server
Apache
Content-Type
audio/mpeg
Content-Range
bytes 0-8404/8405
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
8405
err.mp3
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/
196 KB
196 KB
Media
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/err.mp3
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
fc59bbb18f923747b9cd3f3b23537ff09c5ad2fdfc1505a4800a3f269a234e65

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Last-Modified
Thu, 24 May 2018 21:03:44 GMT
Server
Apache
Content-Type
audio/mpeg
Content-Range
bytes 0-200831/200832
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
200832
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=94e6rbusqbrgmifi0sn13gnu77
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=tg871llec8nc9uaq84ilaq0s34
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=f304e5cf0iiuo1pqof5hor34s5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ujihmn2b1bb7v90kh956h3in45
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ujihmn2b1bb7v90kh956h3in45
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ujihmn2b1bb7v90kh956h3in45
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
beep.mp3
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame DE6D
8 KB
8 KB
Media
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/beep.mp3
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
0589be7715d2320e559eae6bd26f3528e97450c70293da2e1e8ce45f77f99ab1

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/beep.mp3
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Last-Modified
Wed, 28 Feb 2018 14:07:56 GMT
Server
Apache
Content-Type
audio/mpeg
Content-Range
bytes 0-8404/8405
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
8405
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
css
fonts.googleapis.com/ Frame D9DD
8 KB
710 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
d34c7dfb31a485518c27a55eb41e6109e25f1c5c053b9a0936ff96af22199489
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 00:55:07 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 00:55:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 00:55:07 GMT
css
fonts.googleapis.com/ Frame 5B87
8 KB
664 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
d34c7dfb31a485518c27a55eb41e6109e25f1c5c053b9a0936ff96af22199489
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 00:55:07 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 00:55:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 00:55:07 GMT
css
fonts.googleapis.com/ Frame B661
8 KB
664 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
d34c7dfb31a485518c27a55eb41e6109e25f1c5c053b9a0936ff96af22199489
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 00:55:07 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 00:55:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 00:55:07 GMT
css
fonts.googleapis.com/ Frame 6B2C
8 KB
664 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
d34c7dfb31a485518c27a55eb41e6109e25f1c5c053b9a0936ff96af22199489
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 00:55:07 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 00:55:07 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 00:55:07 GMT
emojione.min.css
cdn.jsdelivr.net/emojione/2.2.7/assets/css/ Frame 6B2C
192 B
553 B
Stylesheet
General
Full URL
https://cdn.jsdelivr.net/emojione/2.2.7/assets/css/emojione.min.css
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5714 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
519edf0dc00972d9a811c5e60b94cf719b30351a8dfe62f38fab8d4b5182558b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 00:55:07 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
age
6802033
cf-ray
555c1f408850c286-FRA
x-cache
HIT, HIT
status
200
vary
Accept-Encoding
x-served-by
cache-ams21037-AMS, cache-fra19142-FRA
server
cloudflare
etag
W/"c0-akPwBVON2fKdb1Kdc8vjvcdyWY0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/css; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
timing-allow-origin
*
emojione.min.js
cdn.jsdelivr.net/emojione/2.2.7/lib/js/ Frame 6B2C
295 KB
36 KB
Script
General
Full URL
https://cdn.jsdelivr.net/emojione/2.2.7/lib/js/emojione.min.js
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5714 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5c06455e539dcd889f7f05d709b5adc76c444099fe57f431365af2fc57e803b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 00:55:07 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
age
6802034
cf-ray
555c1f408853c286-FRA
x-cache
HIT, HIT
status
200
vary
Accept-Encoding
x-served-by
cache-ams21034-AMS, cache-hhn4075-HHN
server
cloudflare
etag
W/"49dda-cp9vjKV4fYl0Ow7X6yf9dkBr+YU"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
timing-allow-origin
*
1579136107595
va.tawk.to/register/
709 B
1 KB
XHR
General
Full URL
https://va.tawk.to/register/1579136107595
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a0294339972e9a9984742ae637c782f8d13ca3c0d3de2bd5cd9a692c2bf1cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 16 Jan 2020 00:55:07 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
status
200
vary
Accept-Encoding
x-served-by
visitor-application-preemptive-8cq8
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=0; includeSubDomains; preload
access-control-allow-methods
POST
content-type
application/json
access-control-allow-origin
http://yhngf.frewdsjcvykiyiktjl.cf
cache-control
no-cache
access-control-allow-credentials
true
cf-ray
555c1f409f98d709-FRA
access-control-allow-headers
origin, content-type
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=1579136107595
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=1579136107595
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=1579136107595
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=1579136107595
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=1579136107595
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v16/ Frame B661
14 KB
14 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v16/S6uyw4BMUTPHjx4wXiWtFCc.woff2
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:100,100i,300,300i,400,400i,700,700i,900,900i&subset=latin-ext
Origin
http://yhngf.frewdsjcvykiyiktjl.cf

Response headers

date
Mon, 13 Jan 2020 22:49:04 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:45:55 GMT
server
sffe
age
180363
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
14044
x-xss-protection
0
expires
Tue, 12 Jan 2021 22:49:04 GMT
/
vs82.tawk.to/s/
101 B
201 B
XHR
General
Full URL
https://vs82.tawk.to/s/?k=5e1fb46bef3f437de897dc3e&u=O1xqTOm0gGl605g4vhnHZJzgnf%2BptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E&uv=2&a=54ab9861f7d9f97ff8e285d3&cver=0&pop=false&w=IPSe8g&jv=681&asver=4107&ust=false&p=Official%20Microsoft%20Support&r=&EIO=3&transport=polling&__t=M-hsCLQ
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1343331736952db64c3ef42f3b03ab2dbe2f238458a23b9e8607375c83aeccb9
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf

Response headers

date
Thu, 16 Jan 2020 00:55:08 GMT
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=0; includeSubDomains; preload
content-type
application/octet-stream
access-control-allow-origin
http://yhngf.frewdsjcvykiyiktjl.cf
access-control-allow-credentials
true
cf-ray
555c1f424a59d709-FRA
content-length
101
26a1.png
cdn.jsdelivr.net/emojione/assets/png/ Frame 6B2C
413 B
579 B
Image
General
Full URL
https://cdn.jsdelivr.net/emojione/assets/png/26a1.png?v=2.2.7
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5714 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f8144ae6f866129aea41bbf694b0c858ef9352a139969e57cd8db73385f52c3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 00:55:07 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
6627954
cf-ray
555c1f423b2ec286-FRA
x-cache
HIT, HIT
status
200
vary
Accept-Encoding
content-length
413
x-served-by
cache-ams21032-AMS, cache-hhn4065-HHN
server
cloudflare
etag
W/"19d-NgetWBBUGNU0Su9xItAjaREfnb0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:07 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
/
vs82.tawk.to/s/
1 KB
1 KB
XHR
General
Full URL
https://vs82.tawk.to/s/?k=5e1fb46bef3f437de897dc3e&u=O1xqTOm0gGl605g4vhnHZJzgnf%2BptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E&uv=2&a=54ab9861f7d9f97ff8e285d3&cver=0&pop=false&w=IPSe8g&jv=681&asver=4107&ust=false&p=Official%20Microsoft%20Support&r=&EIO=3&transport=polling&__t=M-hsCNn&sid=KACLD_qIwj7iKPRf7I93
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0bd1182af4a04d7de1145cebddf6e72d034ab2925c40028a2ce0026ccba341b9
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf

Response headers

date
Thu, 16 Jan 2020 00:55:08 GMT
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=0; includeSubDomains; preload
content-type
application/octet-stream
access-control-allow-origin
http://yhngf.frewdsjcvykiyiktjl.cf
access-control-allow-credentials
true
cf-ray
555c1f432bbdd709-FRA
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
v3
va.tawk.to/log-performance/
5 B
116 B
XHR
General
Full URL
https://va.tawk.to/log-performance/v3
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 16 Jan 2020 00:55:08 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
status
200
vary
Accept-Encoding
x-served-by
visitor-application-preemptive-67zv
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=0; includeSubDomains; preload
access-control-allow-methods
POST
content-type
text/html; charset=utf-8
access-control-allow-origin
http://yhngf.frewdsjcvykiyiktjl.cf
access-control-allow-credentials
true
cf-ray
555c1f440cf7d709-FRA
access-control-allow-headers
origin, content-type
/
vs82.tawk.to/s/
4 B
63 B
XHR
General
Full URL
https://vs82.tawk.to/s/?k=5e1fb46bef3f437de897dc3e&u=O1xqTOm0gGl605g4vhnHZJzgnf%2BptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E&uv=2&a=54ab9861f7d9f97ff8e285d3&cver=0&pop=false&w=IPSe8g&jv=681&asver=4107&ust=false&p=Official%20Microsoft%20Support&r=&EIO=3&transport=polling&__t=M-hsCQ2&sid=KACLD_qIwj7iKPRf7I93
Requested by
Host: embed.tawk.to
URL: https://embed.tawk.to/54ab9861f7d9f97ff8e285d3/default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:f34f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a9a2f1dd042cb6f1eded53dc0a1c66ed8694fc093dc3520cdac1a541d615d474
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Origin
http://yhngf.frewdsjcvykiyiktjl.cf

Response headers

date
Thu, 16 Jan 2020 00:55:08 GMT
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=0; includeSubDomains; preload
content-type
application/octet-stream
access-control-allow-origin
http://yhngf.frewdsjcvykiyiktjl.cf
access-control-allow-credentials
true
cf-ray
555c1f440d03d709-FRA
content-length
4
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:08 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:09 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:11 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:12 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=u29khv2ffk02lct3u6kqv1gpc1; TawkConnectionTime=0; __tawkuuid=e::yhngf.frewdsjcvykiyiktjl.cf::O1xqTOm0gGl605g4vhnHZJzgnf+ptSsI8LEpKdrD6VQJ4fGUDgdChnidPSKrXW9E::2; Tawk_54ab9861f7d9f97ff8e285d3=vs82.tawk.to::0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:13 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=2vtln70b99pbncgkag5743d6r3; path=/
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=7ncobm2ildrhkhf2b4kq4jh8b6; path=/
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=ab2ggq7svnhb1gvvs2m0ki5d94; path=/
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=8kej8ijrmqgtkemujenu9ikjv2; path=/
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=bueojhalqr563dqtlmi3dj0tm4; path=/
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7; path=/
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=2vtln70b99pbncgkag5743d6r3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=2vtln70b99pbncgkag5743d6r3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=7ncobm2ildrhkhf2b4kq4jh8b6
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ab2ggq7svnhb1gvvs2m0ki5d94
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8kej8ijrmqgtkemujenu9ikjv2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=bueojhalqr563dqtlmi3dj0tm4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:14 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:16 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:17 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=ecq4h12h7g8r2lfpgsam2v48t7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=r75pe3tqp04hn8uh374kuij2s5; path=/
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=gma9n37fk8sf0r7c5vrvmrc1h4; path=/
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=3o7khi74aqh2nnal8fulli1sf6; path=/
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:18 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=5m4n7c2s95c2sugjon96ck6al5; path=/
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=coa07g6cdvati377cefl3255l2; path=/
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5; path=/
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=r75pe3tqp04hn8uh374kuij2s5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=r75pe3tqp04hn8uh374kuij2s5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=gma9n37fk8sf0r7c5vrvmrc1h4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=3o7khi74aqh2nnal8fulli1sf6
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=5m4n7c2s95c2sugjon96ck6al5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=coa07g6cdvati377cefl3255l2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=uf8s905jsfmcardjtjani47ag5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=44o1fhg1fdorse5rejot3bd1o5; path=/
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
745 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=krnnkon30i7urqqnkgp0ce9i54; path=/
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
745 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=0j92pikv91krmeuaovm46kndg6; path=/
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=cbt4n8aeh59ttdf6ju8mfps9p4; path=/
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
745 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=tga8125g2q0r60b8hkorvmphe4; path=/
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
745 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=tev7dsdu0e5ighqflb4vaq0sg5; path=/
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
745 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4; path=/
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=44o1fhg1fdorse5rejot3bd1o5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=krnnkon30i7urqqnkgp0ce9i54
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=cbt4n8aeh59ttdf6ju8mfps9p4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=cbt4n8aeh59ttdf6ju8mfps9p4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=tga8125g2q0r60b8hkorvmphe4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=tev7dsdu0e5ighqflb4vaq0sg5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:22 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=5
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=4
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=3
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:23 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=2
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=1
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
652 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
689 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:24 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:25 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=94
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=93
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=92
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=91
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=90
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=89
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:26 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=88
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=87
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=86
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=85
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=84
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:27 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=83
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=82
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=81
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=80
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6ku10ja1sujgbuvpp8lgd35qd4
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=79
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=229pt0v1qt5mhs0n4qcl7ubsn3; path=/
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=tndv1lpb58f1n3u9t94io15kp5; path=/
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=bvsjrqg3bnjdsj7fmr96qr1192; path=/
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=8g7q3m4vvsd42fgd49hvosiso3; path=/
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=pett5ii1oqlvp0l3j02ovqqqd7; path=/
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1; path=/
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=229pt0v1qt5mhs0n4qcl7ubsn3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=78
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=229pt0v1qt5mhs0n4qcl7ubsn3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=bvsjrqg3bnjdsj7fmr96qr1192
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=tndv1lpb58f1n3u9t94io15kp5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8g7q3m4vvsd42fgd49hvosiso3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:28 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=pett5ii1oqlvp0l3j02ovqqqd7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=77
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=76
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=75
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=73
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:29 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=72
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=71
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=70
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=69
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=h26ttqp9b1p788vqb98oorf0g1; path=/
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=68
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=h4a27m7gm012p5np7ltaag7ru1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=67
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=66pt0ginmkp1v7j85lhfujf9o3; path=/
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=b4apdfhmat96o0tmu7scgmst91; path=/
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=6h1a62qcmq5olfaj826qc04a71; path=/
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:30 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=40607f0o7d343jbo21vk4e9mj7; path=/
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cookie set 09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
746 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Set-Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1; path=/
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=66pt0ginmkp1v7j85lhfujf9o3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=66pt0ginmkp1v7j85lhfujf9o3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=66
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=66pt0ginmkp1v7j85lhfujf9o3
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=b4apdfhmat96o0tmu7scgmst91
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=6h1a62qcmq5olfaj826qc04a71
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=40607f0o7d343jbo21vk4e9mj7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=65
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=64
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=63
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=62
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=61
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:31 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=59
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=58
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=57
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=56
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
Redirect Chain
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
  • http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Location
09windowshelp.php
Content-Length
0
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=55
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:32 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=54
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=53
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=52
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=51
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=50
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=49
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:33 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=48
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=47
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=46
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=45
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=44
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:34 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=43
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=42
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=41
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=40
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=39
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=38
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=21
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:35 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=37
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=20
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=19
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=36
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=18
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=35
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=17
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=34
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=16
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=33
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=15
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=27
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=32
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=14
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=26
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=13
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=31
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=12
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=25
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=30
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=8
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=11
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=24
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=29
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=10
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=7
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=23
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=28
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=9
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
84 B
687 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash
11359d75d1ccf8ead98ba93030fb3e9050157c154ac53255f9dda71f1465c3d7

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=6
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
84 B
688 B
Document
General
Full URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Requested by
Host: yhngf.frewdsjcvykiyiktjl.cf
URL: http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/?query=sou=933f5dc28a8521abfbb0165a2e8439db&cat=0.03&bid=&re=US&cs=&bro=&rdtrckcbp=1579125651&rtkcid=5e1f8b93f0ed2f0001a62d68&rtkcmpid=5dde0d0ddad446000198ef8b&tracking=brand=Unknown&model=Unknown&os=Windows&browser=Internet+Explorer&city=Pine+Bluff&country=United+States&org=AT%2526T+U-verse&isp=AT%2526T+U-verse&carrier=AT%2526T&model2=Emulator%257CDesktop&connectiontype=Cable%252FDSL&countrycode=US&domain=sbcglobal.net&timestamp=1579125652&ip=104.48.236.134
Protocol
HTTP/1.1
Server
142.4.3.120 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-3-120.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Host
yhngf.frewdsjcvykiyiktjl.cf
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=8aq540tguhsr8357s34sim9qe1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Response headers

Date
Thu, 16 Jan 2020 00:55:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
WWW-Authenticate
Basic realm="Suspicious activity detected on your IP address due to harmful virus installed in your computer. Call Toll Free now @ +1-860-764-4080 for any assistance. "
Refresh
0; url=/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Keep-Alive
timeout=5, max=22
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 4089
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 93CB
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8498
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 49C2
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame C06B
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 839E
0
0

09windowshelp.php
yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/ Frame 8854
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php
Domain
yhngf.frewdsjcvykiyiktjl.cf
URL
http://yhngf.frewdsjcvykiyiktjl.cf/5xidgejhjhjhvfklijhhyjuik/09windowshelp.php

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) Tech Support Scam (Consumer)

29 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| Tawk_API object| Tawk_LoadStart function| $ function| jQuery object| msgAudioEl number| playMsgInt function| get_browser boolean| InternetEx boolean| isIEedge object| browser undefined| msg_ff string| $_Tawk_AccountKey string| $_Tawk_WidgetId boolean| $_Tawk_Unstable object| $_Tawk function| $__TawkEngine function| EventEmitter function| $__TawkSocket object| $_Tawk_LoadStart function| TawkClass object| Inheritance_Manager string| messagePreviewRadius string| bottomBorderRadius string| topBorderRadius number| minWidth number| minHeight string| bodyClassName

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

cdn.jsdelivr.net
code.jquery.com
embed.tawk.to
fonts.googleapis.com
fonts.gstatic.com
va.tawk.to
vs82.tawk.to
yhngf.frewdsjcvykiyiktjl.cf
yhngf.frewdsjcvykiyiktjl.cf
142.4.3.120
209.197.3.24
2606:4700:10::6814:f34f
2606:4700::6810:5714
2a00:1450:4001:81d::2003
2a00:1450:4001:824::200a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